diff --git a/cves/2022/21xxx/CVE-2022-21978.json b/cves/2022/21xxx/CVE-2022-21978.json index 7611e8dbfa96..47d048e92c66 100644 --- a/cves/2022/21xxx/CVE-2022-21978.json +++ b/cves/2022/21xxx/CVE-2022-21978.json @@ -3,13 +3,52 @@ "cna": { "title": "Microsoft Exchange Server Elevation of Privilege Vulnerability", "datePublic": "2022-05-10T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:*:cumulative_update_22:*:*:*:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "15.01.2375.028" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:*:cumulative_update_11:*:*:*:*:*:*", + "versionStartIncluding": "15.02.0", + "versionEndExcluding": "15.02.0986.026" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:*:cumulative_update_23:*:*:*:*:*:*", + "versionStartIncluding": "15.00.0", + "versionEndExcluding": "15.00.1497.36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:*:cumulative_update_23:*:*:*:*:*:*", + "versionStartIncluding": "15.01.0", + "versionEndExcluding": "15.01.2507.009" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:exchange_server:*:cumulative_update_12:*:*:*:*:*:*", + "versionStartIncluding": "15.02.0", + "versionEndExcluding": "15.02.1118.009" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Exchange Server 2016 Cumulative Update 22", - "cpes": [ - "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_22:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -25,9 +64,6 @@ { "vendor": "Microsoft", "product": "Microsoft Exchange Server 2019 Cumulative Update 11", - "cpes": [ - "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_11:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -43,9 +79,6 @@ { "vendor": "Microsoft", "product": "Microsoft Exchange Server 2013 Cumulative Update 23", - "cpes": [ - "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -61,9 +94,6 @@ { "vendor": "Microsoft", "product": "Microsoft Exchange Server 2016 Cumulative Update 23", - "cpes": [ - "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_23:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -79,9 +109,6 @@ { "vendor": "Microsoft", "product": "Microsoft Exchange Server 2019 Cumulative Update 12", - "cpes": [ - "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_12:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -115,14 +142,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:54.365Z" + "dateUpdated": "2025-01-02T18:58:25.947Z" }, "references": [ { + "name": "Microsoft Exchange Server Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21978" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21978" } ], "metrics": [ @@ -169,7 +197,7 @@ "cveId": "CVE-2022-21978", "datePublished": "2022-05-10T20:33:14", "dateReserved": "2021-12-16T00:00:00", - "dateUpdated": "2024-08-03T03:00:54.517Z", + "dateUpdated": "2025-01-02T18:58:25.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/22xxx/CVE-2022-22018.json b/cves/2022/22xxx/CVE-2022-22018.json index 10fb007dfede..da45b51d7324 100644 --- a/cves/2022/22xxx/CVE-2022-22018.json +++ b/cves/2022/22xxx/CVE-2022-22018.json @@ -3,13 +3,34 @@ "cna": { "title": "HEVC Video Extensions Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0.0", + "versionEndExcluding": "2.0.51122.0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "2.0.51121.0" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "HEVC Video Extension", - "cpes": [ - "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -25,9 +46,6 @@ { "vendor": "Microsoft", "product": "HEVC Video Extensions", - "cpes": [ - "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -61,14 +79,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:03.926Z" + "dateUpdated": "2025-01-02T19:02:47.939Z" }, "references": [ { + "name": "HEVC Video Extensions Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22018" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22018" } ], "metrics": [ @@ -115,7 +134,7 @@ "cveId": "CVE-2022-22018", "datePublished": "2022-06-15T21:51:09", "dateReserved": "2021-12-16T00:00:00", - "dateUpdated": "2024-09-10T15:57:03.926Z", + "dateUpdated": "2025-01-02T19:02:47.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/22xxx/CVE-2022-22019.json b/cves/2022/22xxx/CVE-2022-22019.json index de4fb94407b0..479892b4d5aa 100644 --- a/cves/2022/22xxx/CVE-2022-22019.json +++ b/cves/2022/22xxx/CVE-2022-22019.json @@ -3,18 +3,201 @@ "cna": { "title": "Remote Procedure Call Runtime Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +212,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +227,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +242,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +259,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +276,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +291,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +307,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +322,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +338,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +371,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +387,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +402,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,9 +417,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -306,9 +432,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -324,13 +447,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -342,33 +458,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -378,17 +479,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -398,15 +495,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -416,15 +510,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -434,15 +525,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -452,15 +540,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -470,15 +555,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -488,50 +570,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -556,14 +618,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:50.455Z" + "dateUpdated": "2025-01-02T18:58:21.892Z" }, "references": [ { + "name": "Remote Procedure Call Runtime Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22019" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22019" } ], "metrics": [ @@ -610,7 +673,7 @@ "cveId": "CVE-2022-22019", "datePublished": "2022-05-10T20:33:29", "dateReserved": "2021-12-16T00:00:00", - "dateUpdated": "2024-08-03T03:00:54.815Z", + "dateUpdated": "2025-01-02T18:58:21.892Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/22xxx/CVE-2022-22021.json b/cves/2022/22xxx/CVE-2022-22021.json index 13d3ebac6817..ffcba365ec84 100644 --- a/cves/2022/22xxx/CVE-2022-22021.json +++ b/cves/2022/22xxx/CVE-2022-22021.json @@ -3,13 +3,28 @@ "cna": { "title": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability", "datePublic": "2022-06-09T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "102.0.1245.39" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Edge (Chromium-based)", - "cpes": [ - "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,22 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:04.515Z" + "dateUpdated": "2025-01-02T19:02:48.950Z" }, "references": [ { + "name": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22021" - }, - { - "name": "GLSA-202208-25", - "tags": [ - "vendor-advisory", - "x_refsource_GENTOO" + "vendor-advisory" ], - "url": "https://security.gentoo.org/glsa/202208-25" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22021" } ], "metrics": [ @@ -114,7 +122,7 @@ "cveId": "CVE-2022-22021", "datePublished": "2022-06-15T21:51:10", "dateReserved": "2021-12-16T00:00:00", - "dateUpdated": "2024-09-10T15:57:04.515Z", + "dateUpdated": "2025-01-02T19:02:48.950Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/23xxx/CVE-2022-23279.json b/cves/2022/23xxx/CVE-2022-23279.json index 2fbd0f4b5aa7..4fe90bd57458 100644 --- a/cves/2022/23xxx/CVE-2022-23279.json +++ b/cves/2022/23xxx/CVE-2022-23279.json @@ -3,15 +3,64 @@ "cna": { "title": "Windows ALPC Elevation of Privilege Vulnerability", "datePublic": "2022-05-10T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -29,11 +78,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -51,15 +95,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -69,10 +110,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -89,9 +126,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -107,10 +141,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -127,27 +157,17 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] } @@ -172,14 +192,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:53.284Z" + "dateUpdated": "2025-01-02T18:58:24.832Z" }, "references": [ { + "name": "Windows ALPC Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23279" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23279" } ], "metrics": [ @@ -226,7 +247,7 @@ "cveId": "CVE-2022-23279", "datePublished": "2022-05-10T20:33:35", "dateReserved": "2022-01-15T00:00:00", - "dateUpdated": "2024-08-03T03:36:20.419Z", + "dateUpdated": "2025-01-02T18:58:24.832Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/26xxx/CVE-2022-26905.json b/cves/2022/26xxx/CVE-2022-26905.json index ab55eaee6e31..8e3730b6ea65 100644 --- a/cves/2022/26xxx/CVE-2022-26905.json +++ b/cves/2022/26xxx/CVE-2022-26905.json @@ -3,13 +3,28 @@ "cna": { "title": "Microsoft Edge (Chromium-based) Spoofing Vulnerability", "datePublic": "2022-05-31T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "102.0.1245.30" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Edge (Chromium-based)", - "cpes": [ - "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,22 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:52.755Z" + "dateUpdated": "2025-01-02T18:58:24.232Z" }, "references": [ { + "name": "Microsoft Edge (Chromium-based) Spoofing Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26905" - }, - { - "name": "GLSA-202208-25", - "tags": [ - "vendor-advisory", - "x_refsource_GENTOO" + "vendor-advisory" ], - "url": "https://security.gentoo.org/glsa/202208-25" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26905" } ], "metrics": [ @@ -114,7 +122,7 @@ "cveId": "CVE-2022-26905", "datePublished": "2022-06-01T20:10:13", "dateReserved": "2022-03-11T00:00:00", - "dateUpdated": "2024-08-03T05:18:38.056Z", + "dateUpdated": "2025-01-02T18:58:24.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/26xxx/CVE-2022-26923.json b/cves/2022/26xxx/CVE-2022-26923.json index 5ab779f86779..4b7b5afe03d2 100644 --- a/cves/2022/26xxx/CVE-2022-26923.json +++ b/cves/2022/26xxx/CVE-2022-26923.json @@ -3,18 +3,147 @@ "cna": { "title": "Active Directory Domain Services Elevation of Privilege Vulnerability", "datePublic": "2022-05-10T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.4252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.4252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.4252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.4252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.1668" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.1817" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5850" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5850" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5850" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20919" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20919" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4252:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4252:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4252:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.4252", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +158,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4252:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.4252", "versionType": "custom", "status": "affected" @@ -47,15 +173,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4252:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.4252", "versionType": "custom", "status": "affected" @@ -65,11 +188,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +205,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +222,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.1668:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.1668", "versionType": "custom", "status": "affected" @@ -127,10 +237,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +253,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.1817:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.1817:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +284,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +317,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5850:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5850:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5850", "versionType": "custom", "status": "affected" @@ -252,15 +333,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5850:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5850", "versionType": "custom", "status": "affected" @@ -270,15 +348,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5850:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5850", "versionType": "custom", "status": "affected" @@ -288,13 +363,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -306,33 +374,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20919:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20919", "versionType": "custom", "status": "affected" @@ -342,15 +395,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20919:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20919", "versionType": "custom", "status": "affected" @@ -378,14 +428,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:53.803Z" + "dateUpdated": "2025-01-02T18:58:25.436Z" }, "references": [ { + "name": "Active Directory Domain Services Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26923" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26923" } ], "metrics": [ @@ -432,7 +483,7 @@ "cveId": "CVE-2022-26923", "datePublished": "2022-05-10T20:33:39", "dateReserved": "2022-03-11T00:00:00", - "dateUpdated": "2024-08-03T05:18:38.140Z", + "dateUpdated": "2025-01-02T18:58:25.436Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29107.json b/cves/2022/29xxx/CVE-2022-29107.json index b23e4f2c0a8d..023137f81dd8 100644 --- a/cves/2022/29xxx/CVE-2022-29107.json +++ b/cves/2022/29xxx/CVE-2022-29107.json @@ -3,13 +3,70 @@ "cna": { "title": "Microsoft Office Security Feature Bypass Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.1", + "versionEndExcluding": "https://aka.ms/OfficeSecurityReleases" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0.0", + "versionEndExcluding": "https://aka.ms/OfficeSecurityReleases" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.0.1", + "versionEndExcluding": "https://aka.ms/OfficeSecurityReleases" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:word:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.1", + "versionEndExcluding": "16.0.5317.1000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:publisher:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.5317.1000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:publisher:*:sp1:*:*:*:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "15.0.5449.1000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:word:*:sp1:*:*:*:*:*:*", + "versionStartIncluding": "15.0.1", + "versionEndExcluding": "15.0.5449.1000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:word:*:sp1:*:*:*:*:*:*", + "versionStartIncluding": "15.0.1", + "versionEndExcluding": "15.0.5449.1000" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Office LTSC 2021", - "cpes": [ - "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems", "32-bit Systems" @@ -26,9 +83,6 @@ { "vendor": "Microsoft", "product": "Microsoft Office 2019", - "cpes": [ - "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" @@ -45,9 +99,6 @@ { "vendor": "Microsoft", "product": "Microsoft 365 Apps for Enterprise", - "cpes": [ - "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" @@ -64,9 +115,6 @@ { "vendor": "Microsoft", "product": "Microsoft Word 2016", - "cpes": [ - "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" @@ -83,10 +131,6 @@ { "vendor": "Microsoft", "product": "Microsoft Publisher 2016", - "cpes": [ - "cpe:2.3:a:microsoft:publisher:2016:*:*:*:*:*:x86:*", - "cpe:2.3:a:microsoft:publisher:2016:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" @@ -103,9 +147,6 @@ { "vendor": "Microsoft", "product": "Microsoft Publisher 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:publisher:2013:sp1:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" @@ -122,9 +163,6 @@ { "vendor": "Microsoft", "product": "Microsoft Word 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*" - ], "platforms": [ "ARM64-based Systems", "32-bit Systems" @@ -140,10 +178,7 @@ }, { "vendor": "Microsoft", - "product": "Microsoft Word 2013 Service Pack 1 ", - "cpes": [ - "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*" - ], + "product": "Microsoft Word 2013 Service Pack 1", "platforms": [ "x64-based Systems" ], @@ -177,14 +212,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:34.328Z" + "dateUpdated": "2025-01-02T18:58:05.145Z" }, "references": [ { + "name": "Microsoft Office Security Feature Bypass Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29107" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29107" } ], "metrics": [ @@ -231,7 +267,7 @@ "cveId": "CVE-2022-29107", "datePublished": "2022-05-10T20:34:10", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.078Z", + "dateUpdated": "2025-01-02T18:58:05.145Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29108.json b/cves/2022/29xxx/CVE-2022-29108.json index 13f6c3a91c13..6df8f05dff94 100644 --- a/cves/2022/29xxx/CVE-2022-29108.json +++ b/cves/2022/29xxx/CVE-2022-29108.json @@ -3,13 +3,46 @@ "cna": { "title": "Microsoft SharePoint Server Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.5317.1000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.10386.20011" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.14931.20286" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_foundation:*:sp1:*:*:*:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "15.0.5449.1000" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft SharePoint Enterprise Server 2016", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -25,9 +58,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Server 2019", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -43,9 +73,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Server Subscription Edition", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -61,9 +88,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Foundation 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -97,14 +121,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:34.877Z" + "dateUpdated": "2025-01-02T18:58:05.719Z" }, "references": [ { + "name": "Microsoft SharePoint Server Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29108" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29108" } ], "metrics": [ @@ -151,7 +176,7 @@ "cveId": "CVE-2022-29108", "datePublished": "2022-05-10T20:34:11", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.392Z", + "dateUpdated": "2025-01-02T18:58:05.719Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29109.json b/cves/2022/29xxx/CVE-2022-29109.json index e2ca294c053f..8b52b310f638 100644 --- a/cves/2022/29xxx/CVE-2022-29109.json +++ b/cves/2022/29xxx/CVE-2022-29109.json @@ -3,13 +3,46 @@ "cna": { "title": "Microsoft Excel Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0.0", + "versionEndExcluding": "https://aka.ms/OfficeSecurityReleases" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.1", + "versionEndExcluding": "16.0.10386.20015" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.0.1", + "versionEndExcluding": "https://aka.ms/OfficeSecurityReleases" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.1", + "versionEndExcluding": "https://aka.ms/OfficeSecurityReleases" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Office 2019", - "cpes": [ - "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" @@ -26,9 +59,6 @@ { "vendor": "Microsoft", "product": "Microsoft Office Online Server", - "cpes": [ - "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -44,9 +74,6 @@ { "vendor": "Microsoft", "product": "Microsoft 365 Apps for Enterprise", - "cpes": [ - "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" @@ -63,9 +90,6 @@ { "vendor": "Microsoft", "product": "Microsoft Office LTSC 2021", - "cpes": [ - "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems", "32-bit Systems" @@ -100,14 +124,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:35.394Z" + "dateUpdated": "2025-01-02T18:58:06.242Z" }, "references": [ { + "name": "Microsoft Excel Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29109" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29109" } ], "metrics": [ @@ -154,7 +179,7 @@ "cveId": "CVE-2022-29109", "datePublished": "2022-05-10T20:34:13", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.089Z", + "dateUpdated": "2025-01-02T18:58:06.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29110.json b/cves/2022/29xxx/CVE-2022-29110.json index 7e119221fe02..4fda6c35837a 100644 --- a/cves/2022/29xxx/CVE-2022-29110.json +++ b/cves/2022/29xxx/CVE-2022-29110.json @@ -3,14 +3,40 @@ "cna": { "title": "Microsoft Excel Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "16.0.0.0", + "versionEndExcluding": "16.0.5317.1000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:*:sp1:*:*:rt:*:*:*", + "versionStartIncluding": "15.0.0.0", + "versionEndExcluding": "15.0.5449.1000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_web_apps_server:*:sp1:*:*:*:*:*:*", + "versionStartIncluding": "15.0.1", + "versionEndExcluding": "15.0.5449.1000" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Excel 2016", - "cpes": [ - "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*", - "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" @@ -27,11 +53,6 @@ { "vendor": "Microsoft", "product": "Microsoft Excel 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", - "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x86:*", - "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x64:*" - ], "platforms": [ "ARM64-based Systems", "32-bit Systems", @@ -49,9 +70,6 @@ { "vendor": "Microsoft", "product": "Microsoft Office Web Apps Server 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -85,14 +103,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:35.913Z" + "dateUpdated": "2025-01-02T18:58:06.878Z" }, "references": [ { + "name": "Microsoft Excel Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29110" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29110" } ], "metrics": [ @@ -139,7 +158,7 @@ "cveId": "CVE-2022-29110", "datePublished": "2022-05-10T20:34:14", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.165Z", + "dateUpdated": "2025-01-02T18:58:06.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29111.json b/cves/2022/29xxx/CVE-2022-29111.json index a954ba8c4449..c54772f2a9dd 100644 --- a/cves/2022/29xxx/CVE-2022-29111.json +++ b/cves/2022/29xxx/CVE-2022-29111.json @@ -3,13 +3,34 @@ "cna": { "title": "HEVC Video Extensions Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0.0", + "versionEndExcluding": "2.0.51122.0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "2.0.51121.0" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "HEVC Video Extension", - "cpes": [ - "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -25,9 +46,6 @@ { "vendor": "Microsoft", "product": "HEVC Video Extensions", - "cpes": [ - "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -61,14 +79,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:05.125Z" + "dateUpdated": "2025-01-02T19:02:49.699Z" }, "references": [ { + "name": "HEVC Video Extensions Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29111" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29111" } ], "metrics": [ @@ -147,7 +166,7 @@ "cveId": "CVE-2022-29111", "datePublished": "2022-06-15T21:51:12", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-10-01T15:51:07.287Z", + "dateUpdated": "2025-01-02T19:02:49.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29112.json b/cves/2022/29xxx/CVE-2022-29112.json index efd60a00efa6..3436cea1fd84 100644 --- a/cves/2022/29xxx/CVE-2022-29112.json +++ b/cves/2022/29xxx/CVE-2022-29112.json @@ -3,18 +3,201 @@ "cna": { "title": "Windows Graphics Component Information Disclosure Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +212,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +227,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +242,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +259,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +276,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +291,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +307,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +322,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +338,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +371,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +387,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +402,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,9 +417,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -306,9 +432,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -324,13 +447,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -342,33 +458,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -378,17 +479,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -398,15 +495,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -416,15 +510,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -434,15 +525,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -452,15 +540,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -470,15 +555,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -488,50 +570,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -556,14 +618,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:36.438Z" + "dateUpdated": "2025-01-02T18:58:07.485Z" }, "references": [ { + "name": "Windows Graphics Component Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29112" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29112" } ], "metrics": [ @@ -642,7 +705,7 @@ "cveId": "CVE-2022-29112", "datePublished": "2022-05-10T20:34:15", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-11-20T15:43:28.363Z", + "dateUpdated": "2025-01-02T18:58:07.485Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29113.json b/cves/2022/29xxx/CVE-2022-29113.json index 635748077f56..325a51429edd 100644 --- a/cves/2022/29xxx/CVE-2022-29113.json +++ b/cves/2022/29xxx/CVE-2022-29113.json @@ -3,18 +3,99 @@ "cna": { "title": "Windows Digital Media Receiver Elevation of Privilege Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +110,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +125,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +140,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +157,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,10 +174,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -129,9 +190,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -147,10 +205,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -167,27 +221,17 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] } @@ -212,14 +256,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:36.995Z" + "dateUpdated": "2025-01-02T18:58:08.121Z" }, "references": [ { + "name": "Windows Digital Media Receiver Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29113" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29113" } ], "metrics": [ @@ -266,7 +311,7 @@ "cveId": "CVE-2022-29113", "datePublished": "2022-05-10T20:34:17", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.360Z", + "dateUpdated": "2025-01-02T18:58:08.121Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29114.json b/cves/2022/29xxx/CVE-2022-29114.json index 9d8dfbbf5f4d..100f640365a9 100644 --- a/cves/2022/29xxx/CVE-2022-29114.json +++ b/cves/2022/29xxx/CVE-2022-29114.json @@ -3,18 +3,159 @@ "cna": { "title": "Windows Print Spooler Information Disclosure Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +170,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +185,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +200,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +217,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +234,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +249,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +265,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +280,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +296,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +329,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +345,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +360,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,13 +375,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -306,33 +386,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -342,15 +407,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -360,50 +422,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -428,14 +470,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:37.524Z" + "dateUpdated": "2025-01-02T18:58:08.738Z" }, "references": [ { + "name": "Windows Print Spooler Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29114" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29114" } ], "metrics": [ @@ -482,7 +525,7 @@ "cveId": "CVE-2022-29114", "datePublished": "2022-05-10T20:34:18", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.267Z", + "dateUpdated": "2025-01-02T18:58:08.738Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29115.json b/cves/2022/29xxx/CVE-2022-29115.json index fbc6d68bbc7b..6390e8d6a837 100644 --- a/cves/2022/29xxx/CVE-2022-29115.json +++ b/cves/2022/29xxx/CVE-2022-29115.json @@ -3,18 +3,201 @@ "cna": { "title": "Windows Fax Service Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +212,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +227,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +242,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +259,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +276,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +291,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +307,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +322,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +338,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +371,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +387,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +402,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,9 +417,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -306,9 +432,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -324,13 +447,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -342,33 +458,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -378,17 +479,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -398,15 +495,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -416,15 +510,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -434,15 +525,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -452,15 +540,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -470,15 +555,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -488,50 +570,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -556,14 +618,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:38.057Z" + "dateUpdated": "2025-01-02T18:58:09.358Z" }, "references": [ { + "name": "Windows Fax Service Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29115" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29115" } ], "metrics": [ @@ -610,7 +673,7 @@ "cveId": "CVE-2022-29115", "datePublished": "2022-05-10T20:34:20", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.348Z", + "dateUpdated": "2025-01-02T18:58:09.358Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29116.json b/cves/2022/29xxx/CVE-2022-29116.json index e2aa6101edbb..8886b75b9ca3 100644 --- a/cves/2022/29xxx/CVE-2022-29116.json +++ b/cves/2022/29xxx/CVE-2022-29116.json @@ -3,14 +3,28 @@ "cna": { "title": "Windows Kernel Information Disclosure Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -45,14 +59,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:54.899Z" + "dateUpdated": "2025-01-02T18:58:26.467Z" }, "references": [ { + "name": "Windows Kernel Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29116" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29116" } ], "metrics": [ @@ -99,7 +114,7 @@ "cveId": "CVE-2022-29116", "datePublished": "2022-05-10T20:34:21", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.359Z", + "dateUpdated": "2025-01-02T18:58:26.467Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29117.json b/cves/2022/29xxx/CVE-2022-29117.json index 221889241268..43782048a466 100644 --- a/cves/2022/29xxx/CVE-2022-29117.json +++ b/cves/2022/29xxx/CVE-2022-29117.json @@ -3,13 +3,64 @@ "cna": { "title": ".NET and Visual Studio Denial of Service Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndExcluding": "6.0.5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1", + "versionEndExcluding": "3.1.25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.0.17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "16.9.21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.1.7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.11.0", + "versionEndExcluding": "16.11.14" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": ".NET 6.0", - "cpes": [ - "cpe:2.3:a:microsoft:.net:6.0.0:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -25,9 +76,6 @@ { "vendor": "Microsoft", "product": ".NET Core 3.1", - "cpes": [ - "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,9 +91,6 @@ { "vendor": "Microsoft", "product": ".NET 5.0", - "cpes": [ - "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -61,9 +106,6 @@ { "vendor": "Microsoft", "product": "Microsoft Visual Studio 2022 version 17.0", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -79,9 +121,6 @@ { "vendor": "Microsoft", "product": "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -97,9 +136,6 @@ { "vendor": "Microsoft", "product": "Microsoft Visual Studio 2022 version 17.1", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2022:17.1:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -115,9 +151,6 @@ { "vendor": "Microsoft", "product": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -151,38 +184,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:38.581Z" + "dateUpdated": "2025-01-02T18:58:09.910Z" }, "references": [ { + "name": ".NET and Visual Studio Denial of Service Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29117" - }, - { - "name": "FEDORA-2022-d69fee9f38", - "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" - ], - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/" - }, - { - "name": "FEDORA-2022-9a1d5ea33c", - "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" - ], - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/" - }, - { - "name": "FEDORA-2022-256d559f0c", - "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" + "vendor-advisory" ], - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29117" } ], "metrics": [ @@ -256,7 +266,7 @@ "cveId": "CVE-2022-29117", "datePublished": "2022-05-10T20:34:23", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.422Z", + "dateUpdated": "2025-01-02T18:58:09.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29119.json b/cves/2022/29xxx/CVE-2022-29119.json index cd9f5aef9ea9..87aa5907a815 100644 --- a/cves/2022/29xxx/CVE-2022-29119.json +++ b/cves/2022/29xxx/CVE-2022-29119.json @@ -3,13 +3,34 @@ "cna": { "title": "HEVC Video Extensions Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0.0", + "versionEndExcluding": "2.0.51122.0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "2.0.51121.0" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "HEVC Video Extension", - "cpes": [ - "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -25,9 +46,6 @@ { "vendor": "Microsoft", "product": "HEVC Video Extensions", - "cpes": [ - "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -61,14 +79,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:03.304Z" + "dateUpdated": "2025-01-02T19:02:47.240Z" }, "references": [ { + "name": "HEVC Video Extensions Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29119" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29119" } ], "metrics": [ @@ -115,7 +134,7 @@ "cveId": "CVE-2022-29119", "datePublished": "2022-06-15T21:51:13", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-09-10T15:57:03.304Z", + "dateUpdated": "2025-01-02T19:02:47.240Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29120.json b/cves/2022/29xxx/CVE-2022-29120.json index ce0625bb78b9..9b146b9ac7b0 100644 --- a/cves/2022/29xxx/CVE-2022-29120.json +++ b/cves/2022/29xxx/CVE-2022-29120.json @@ -3,19 +3,88 @@ "cna": { "title": "Windows Clustered Shared Volume Information Disclosure Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -25,15 +94,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -43,15 +109,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -61,9 +124,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -79,15 +139,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -97,15 +154,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -115,15 +169,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -133,15 +184,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -151,50 +199,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -219,14 +247,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:55.414Z" + "dateUpdated": "2025-01-02T18:58:26.916Z" }, "references": [ { + "name": "Windows Clustered Shared Volume Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29120" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29120" } ], "metrics": [ @@ -273,7 +302,7 @@ "cveId": "CVE-2022-29120", "datePublished": "2022-05-10T20:34:24", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.432Z", + "dateUpdated": "2025-01-02T18:58:26.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29121.json b/cves/2022/29xxx/CVE-2022-29121.json index f7c11dd92761..60818b47328e 100644 --- a/cves/2022/29xxx/CVE-2022-29121.json +++ b/cves/2022/29xxx/CVE-2022-29121.json @@ -3,18 +3,201 @@ "cna": { "title": "Windows WLAN AutoConfig Service Denial of Service Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +212,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +227,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +242,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +259,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +276,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +291,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +307,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +322,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +338,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +371,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +387,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +402,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,9 +417,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -306,9 +432,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -324,13 +447,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -342,33 +458,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -378,17 +479,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -398,15 +495,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -416,15 +510,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -434,15 +525,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -452,15 +540,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -470,15 +555,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -488,50 +570,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -556,14 +618,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:55.961Z" + "dateUpdated": "2025-01-02T18:58:27.509Z" }, "references": [ { + "name": "Windows WLAN AutoConfig Service Denial of Service Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29121" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29121" } ], "metrics": [ @@ -610,7 +673,7 @@ "cveId": "CVE-2022-29121", "datePublished": "2022-05-10T20:34:26", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:58.961Z", + "dateUpdated": "2025-01-02T18:58:27.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29122.json b/cves/2022/29xxx/CVE-2022-29122.json index 6fd78c0ef700..a6c8c3cb6721 100644 --- a/cves/2022/29xxx/CVE-2022-29122.json +++ b/cves/2022/29xxx/CVE-2022-29122.json @@ -3,19 +3,88 @@ "cna": { "title": "Windows Clustered Shared Volume Information Disclosure Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -25,15 +94,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -43,15 +109,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -61,9 +124,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -79,15 +139,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -97,15 +154,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -115,15 +169,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -133,15 +184,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -151,50 +199,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -219,14 +247,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:56.513Z" + "dateUpdated": "2025-01-02T18:58:28.143Z" }, "references": [ { + "name": "Windows Clustered Shared Volume Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29122" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29122" } ], "metrics": [ @@ -273,7 +302,7 @@ "cveId": "CVE-2022-29122", "datePublished": "2022-05-10T20:34:27", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.358Z", + "dateUpdated": "2025-01-02T18:58:28.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29123.json b/cves/2022/29xxx/CVE-2022-29123.json index 030f08b60eab..8f7c3172f6ee 100644 --- a/cves/2022/29xxx/CVE-2022-29123.json +++ b/cves/2022/29xxx/CVE-2022-29123.json @@ -3,19 +3,88 @@ "cna": { "title": "Windows Clustered Shared Volume Information Disclosure Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -25,15 +94,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -43,15 +109,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -61,9 +124,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -79,15 +139,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -97,15 +154,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -115,15 +169,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -133,15 +184,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -151,50 +199,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -219,14 +247,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:57.048Z" + "dateUpdated": "2025-01-02T18:58:28.703Z" }, "references": [ { + "name": "Windows Clustered Shared Volume Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29123" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29123" } ], "metrics": [ @@ -305,7 +334,7 @@ "cveId": "CVE-2022-29123", "datePublished": "2022-05-10T20:34:29", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-10-01T15:51:20.908Z", + "dateUpdated": "2025-01-02T18:58:28.703Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29125.json b/cves/2022/29xxx/CVE-2022-29125.json index eb5d3cafc0c0..831331490428 100644 --- a/cves/2022/29xxx/CVE-2022-29125.json +++ b/cves/2022/29xxx/CVE-2022-29125.json @@ -3,18 +3,159 @@ "cna": { "title": "Windows Push Notifications Apps Elevation of Privilege Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +170,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +185,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +200,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +217,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +234,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +249,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +265,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +280,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +296,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +329,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +345,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +360,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,13 +375,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -306,33 +386,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -342,15 +407,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -360,50 +422,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -428,14 +470,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:39.133Z" + "dateUpdated": "2025-01-02T18:58:10.468Z" }, "references": [ { + "name": "Windows Push Notifications Apps Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29125" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29125" } ], "metrics": [ @@ -514,7 +557,7 @@ "cveId": "CVE-2022-29125", "datePublished": "2022-05-10T20:34:30", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-11-20T15:44:06.653Z", + "dateUpdated": "2025-01-02T18:58:10.468Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29126.json b/cves/2022/29xxx/CVE-2022-29126.json index f1acd0031525..7449fc6ebc80 100644 --- a/cves/2022/29xxx/CVE-2022-29126.json +++ b/cves/2022/29xxx/CVE-2022-29126.json @@ -3,18 +3,159 @@ "cna": { "title": "Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +170,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +185,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +200,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +217,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +234,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +249,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +265,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +280,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +296,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +329,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +345,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +360,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,13 +375,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -306,33 +386,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -342,15 +407,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -360,50 +422,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -428,14 +470,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:39.658Z" + "dateUpdated": "2025-01-02T18:58:11.048Z" }, "references": [ { + "name": "Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29126" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29126" } ], "metrics": [ @@ -482,7 +525,7 @@ "cveId": "CVE-2022-29126", "datePublished": "2022-05-10T20:34:32", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.292Z", + "dateUpdated": "2025-01-02T18:58:11.048Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29127.json b/cves/2022/29xxx/CVE-2022-29127.json index ee597276c2b6..6e5de68973ff 100644 --- a/cves/2022/29xxx/CVE-2022-29127.json +++ b/cves/2022/29xxx/CVE-2022-29127.json @@ -3,18 +3,201 @@ "cna": { "title": "BitLocker Security Feature Bypass Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +212,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +227,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +242,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +259,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +276,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +291,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +307,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +322,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +338,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +371,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +387,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +402,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,9 +417,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -306,9 +432,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -324,13 +447,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -342,33 +458,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -378,17 +479,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -398,15 +495,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -416,15 +510,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -434,15 +525,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -452,15 +540,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -470,15 +555,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -488,50 +570,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -556,14 +618,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:40.199Z" + "dateUpdated": "2025-01-02T18:58:11.592Z" }, "references": [ { + "name": "BitLocker Security Feature Bypass Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29127" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29127" } ], "metrics": [ @@ -610,7 +673,7 @@ "cveId": "CVE-2022-29127", "datePublished": "2022-05-10T20:34:33", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.444Z", + "dateUpdated": "2025-01-02T18:58:11.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29128.json b/cves/2022/29xxx/CVE-2022-29128.json index a0251e041849..6a252b4f3d68 100644 --- a/cves/2022/29xxx/CVE-2022-29128.json +++ b/cves/2022/29xxx/CVE-2022-29128.json @@ -3,18 +3,201 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +212,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +227,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +242,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +259,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +276,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +291,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +307,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +322,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +338,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +371,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +387,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +402,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,9 +417,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -306,9 +432,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -324,13 +447,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -342,33 +458,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -378,17 +479,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -398,15 +495,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -416,15 +510,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -434,15 +525,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -452,15 +540,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -470,15 +555,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -488,50 +570,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -556,14 +618,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:40.712Z" + "dateUpdated": "2025-01-02T18:58:12.267Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29128" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29128" } ], "metrics": [ @@ -610,7 +673,7 @@ "cveId": "CVE-2022-29128", "datePublished": "2022-05-10T20:34:35", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:58.998Z", + "dateUpdated": "2025-01-02T18:58:12.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29129.json b/cves/2022/29xxx/CVE-2022-29129.json index 6377854e9075..7ee26156f298 100644 --- a/cves/2022/29xxx/CVE-2022-29129.json +++ b/cves/2022/29xxx/CVE-2022-29129.json @@ -3,18 +3,201 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +212,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +227,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +242,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +259,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +276,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +291,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +307,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +322,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +338,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +371,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +387,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +402,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,9 +417,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -306,9 +432,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -324,13 +447,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -342,33 +458,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -378,17 +479,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -398,15 +495,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -416,15 +510,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -434,15 +525,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -452,15 +540,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -470,15 +555,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -488,50 +570,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -556,14 +618,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:41.232Z" + "dateUpdated": "2025-01-02T18:58:12.849Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29129" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29129" } ], "metrics": [ @@ -610,7 +673,7 @@ "cveId": "CVE-2022-29129", "datePublished": "2022-05-10T20:34:36", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.283Z", + "dateUpdated": "2025-01-02T18:58:12.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29130.json b/cves/2022/29xxx/CVE-2022-29130.json index 59523f3ab15e..e9d76f34ab91 100644 --- a/cves/2022/29xxx/CVE-2022-29130.json +++ b/cves/2022/29xxx/CVE-2022-29130.json @@ -3,18 +3,201 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +212,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +227,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +242,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +259,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +276,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +291,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +307,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +322,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +338,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +371,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +387,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +402,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,9 +417,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -306,9 +432,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -324,13 +447,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -342,33 +458,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -378,17 +479,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -398,15 +495,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -416,15 +510,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -434,15 +525,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -452,15 +540,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -470,15 +555,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -488,50 +570,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -556,14 +618,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:41.775Z" + "dateUpdated": "2025-01-02T18:58:13.479Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29130" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29130" } ], "metrics": [ @@ -642,7 +705,7 @@ "cveId": "CVE-2022-29130", "datePublished": "2022-05-10T20:34:37", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-10-01T15:51:14.068Z", + "dateUpdated": "2025-01-02T18:58:13.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29131.json b/cves/2022/29xxx/CVE-2022-29131.json index de107145211d..a948e4f46a5c 100644 --- a/cves/2022/29xxx/CVE-2022-29131.json +++ b/cves/2022/29xxx/CVE-2022-29131.json @@ -3,18 +3,105 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +116,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +131,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +146,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +163,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +180,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +195,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +211,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +226,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,27 +242,17 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] } @@ -230,14 +277,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:42.310Z" + "dateUpdated": "2025-01-02T18:58:14.095Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29131" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29131" } ], "metrics": [ @@ -284,7 +332,7 @@ "cveId": "CVE-2022-29131", "datePublished": "2022-05-10T20:34:39", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.357Z", + "dateUpdated": "2025-01-02T18:58:14.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29132.json b/cves/2022/29xxx/CVE-2022-29132.json index cee435d2d364..a798d93fdc72 100644 --- a/cves/2022/29xxx/CVE-2022-29132.json +++ b/cves/2022/29xxx/CVE-2022-29132.json @@ -3,18 +3,201 @@ "cna": { "title": "Windows Print Spooler Elevation of Privilege Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +212,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +227,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +242,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +259,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +276,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +291,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +307,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +322,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +338,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +371,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +387,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +402,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,9 +417,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -306,9 +432,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -324,13 +447,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -342,33 +458,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -378,17 +479,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -398,15 +495,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -416,15 +510,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -434,15 +525,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -452,15 +540,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -470,15 +555,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -488,50 +570,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -556,14 +618,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:42.837Z" + "dateUpdated": "2025-01-02T18:58:14.674Z" }, "references": [ { + "name": "Windows Print Spooler Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29132" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29132" } ], "metrics": [ @@ -610,7 +673,7 @@ "cveId": "CVE-2022-29132", "datePublished": "2022-05-10T20:34:41", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.043Z", + "dateUpdated": "2025-01-02T18:58:14.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29133.json b/cves/2022/29xxx/CVE-2022-29133.json index 486983ebabfb..16263fa0ce44 100644 --- a/cves/2022/29xxx/CVE-2022-29133.json +++ b/cves/2022/29xxx/CVE-2022-29133.json @@ -3,14 +3,28 @@ "cna": { "title": "Windows Kernel Elevation of Privilege Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -45,14 +59,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:43.378Z" + "dateUpdated": "2025-01-02T18:58:15.280Z" }, "references": [ { + "name": "Windows Kernel Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29133" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29133" } ], "metrics": [ @@ -99,7 +114,7 @@ "cveId": "CVE-2022-29133", "datePublished": "2022-05-10T20:34:43", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.380Z", + "dateUpdated": "2025-01-02T18:58:15.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29134.json b/cves/2022/29xxx/CVE-2022-29134.json index e9833a2b3559..730bb63897e4 100644 --- a/cves/2022/29xxx/CVE-2022-29134.json +++ b/cves/2022/29xxx/CVE-2022-29134.json @@ -3,19 +3,76 @@ "cna": { "title": "Windows Clustered Shared Volume Information Disclosure Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -25,15 +82,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -43,15 +97,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -61,9 +112,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -79,15 +127,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -97,15 +142,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -115,50 +157,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -183,14 +205,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:43.922Z" + "dateUpdated": "2025-01-02T18:58:15.760Z" }, "references": [ { + "name": "Windows Clustered Shared Volume Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29134" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29134" } ], "metrics": [ @@ -237,7 +260,7 @@ "cveId": "CVE-2022-29134", "datePublished": "2022-05-10T20:34:44", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.347Z", + "dateUpdated": "2025-01-02T18:58:15.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29135.json b/cves/2022/29xxx/CVE-2022-29135.json index 87fcf5acfb9c..c196ddb95537 100644 --- a/cves/2022/29xxx/CVE-2022-29135.json +++ b/cves/2022/29xxx/CVE-2022-29135.json @@ -3,19 +3,88 @@ "cna": { "title": "Windows Cluster Shared Volume (CSV) Elevation of Privilege Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -25,15 +94,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -43,15 +109,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -61,9 +124,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -79,15 +139,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -97,15 +154,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -115,15 +169,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -133,15 +184,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -151,50 +199,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -219,14 +247,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:44.503Z" + "dateUpdated": "2025-01-02T18:58:16.317Z" }, "references": [ { + "name": "Windows Cluster Shared Volume (CSV) Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29135" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29135" } ], "metrics": [ @@ -305,7 +334,7 @@ "cveId": "CVE-2022-29135", "datePublished": "2022-05-10T20:34:46", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-11-20T15:27:25.600Z", + "dateUpdated": "2025-01-02T18:58:16.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29137.json b/cves/2022/29xxx/CVE-2022-29137.json index 56e61cae4163..8869b94eb98c 100644 --- a/cves/2022/29xxx/CVE-2022-29137.json +++ b/cves/2022/29xxx/CVE-2022-29137.json @@ -3,18 +3,201 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +212,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +227,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +242,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +259,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +276,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +291,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +307,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +322,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +338,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +371,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +387,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +402,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,9 +417,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -306,9 +432,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -324,13 +447,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -342,33 +458,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -378,17 +479,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -398,15 +495,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -416,15 +510,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -434,15 +525,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -452,15 +540,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -470,15 +555,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -488,50 +570,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -556,14 +618,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:45.115Z" + "dateUpdated": "2025-01-02T18:58:16.956Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29137" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29137" } ], "metrics": [ @@ -610,7 +673,7 @@ "cveId": "CVE-2022-29137", "datePublished": "2022-05-10T20:34:47", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.438Z", + "dateUpdated": "2025-01-02T18:58:16.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29138.json b/cves/2022/29xxx/CVE-2022-29138.json index 2129fd00acc5..cf03cbc6cc64 100644 --- a/cves/2022/29xxx/CVE-2022-29138.json +++ b/cves/2022/29xxx/CVE-2022-29138.json @@ -3,19 +3,88 @@ "cna": { "title": "Windows Clustered Shared Volume Elevation of Privilege Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -25,15 +94,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -43,15 +109,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -61,9 +124,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -79,15 +139,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -97,15 +154,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -115,15 +169,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -133,15 +184,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -151,50 +199,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -219,14 +247,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:45.646Z" + "dateUpdated": "2025-01-02T18:58:17.481Z" }, "references": [ { + "name": "Windows Clustered Shared Volume Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29138" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29138" } ], "metrics": [ @@ -273,7 +302,7 @@ "cveId": "CVE-2022-29138", "datePublished": "2022-05-10T20:34:49", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.172Z", + "dateUpdated": "2025-01-02T18:58:17.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29139.json b/cves/2022/29xxx/CVE-2022-29139.json index d558540461a2..39391004f66c 100644 --- a/cves/2022/29xxx/CVE-2022-29139.json +++ b/cves/2022/29xxx/CVE-2022-29139.json @@ -3,18 +3,201 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +212,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +227,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +242,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +259,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +276,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +291,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +307,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +322,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +338,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +371,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +387,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +402,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,9 +417,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -306,9 +432,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -324,13 +447,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -342,33 +458,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -378,17 +479,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -398,15 +495,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -416,15 +510,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -434,15 +525,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -452,15 +540,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -470,15 +555,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -488,50 +570,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -556,14 +618,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:46.188Z" + "dateUpdated": "2025-01-02T18:58:17.940Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29139" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29139" } ], "metrics": [ @@ -610,7 +673,7 @@ "cveId": "CVE-2022-29139", "datePublished": "2022-05-10T20:34:50", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.366Z", + "dateUpdated": "2025-01-02T18:58:17.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29140.json b/cves/2022/29xxx/CVE-2022-29140.json index 5ace9457fecc..9dc844ef401e 100644 --- a/cves/2022/29xxx/CVE-2022-29140.json +++ b/cves/2022/29xxx/CVE-2022-29140.json @@ -3,18 +3,123 @@ "cna": { "title": "Windows Print Spooler Information Disclosure Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +134,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +149,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +164,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +181,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +198,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +213,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +229,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +244,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +260,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -232,15 +293,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -250,15 +308,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -286,14 +341,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:46.719Z" + "dateUpdated": "2025-01-02T18:58:18.409Z" }, "references": [ { + "name": "Windows Print Spooler Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29140" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29140" } ], "metrics": [ @@ -340,7 +396,7 @@ "cveId": "CVE-2022-29140", "datePublished": "2022-05-10T20:34:52", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.466Z", + "dateUpdated": "2025-01-02T18:58:18.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29141.json b/cves/2022/29xxx/CVE-2022-29141.json index ef4fff610b8c..91e531cb74c9 100644 --- a/cves/2022/29xxx/CVE-2022-29141.json +++ b/cves/2022/29xxx/CVE-2022-29141.json @@ -3,18 +3,201 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +212,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +227,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +242,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +259,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +276,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +291,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +307,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +322,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +338,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +371,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +387,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +402,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,9 +417,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -306,9 +432,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -324,13 +447,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -342,33 +458,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -378,17 +479,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -398,15 +495,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -416,15 +510,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -434,15 +525,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -452,15 +540,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -470,15 +555,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -488,50 +570,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -556,14 +618,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:47.240Z" + "dateUpdated": "2025-01-02T18:58:18.926Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29141" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29141" } ], "metrics": [ @@ -610,7 +673,7 @@ "cveId": "CVE-2022-29141", "datePublished": "2022-05-10T20:34:53", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.399Z", + "dateUpdated": "2025-01-02T18:58:18.926Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29142.json b/cves/2022/29xxx/CVE-2022-29142.json index 11f381a87c1c..9227ffe0184a 100644 --- a/cves/2022/29xxx/CVE-2022-29142.json +++ b/cves/2022/29xxx/CVE-2022-29142.json @@ -3,18 +3,93 @@ "cna": { "title": "Windows Kernel Elevation of Privilege Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +104,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,11 +119,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -69,11 +136,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -91,15 +153,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -109,10 +168,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -129,9 +184,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -147,27 +199,17 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] } @@ -192,14 +234,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:47.763Z" + "dateUpdated": "2025-01-02T18:58:19.437Z" }, "references": [ { + "name": "Windows Kernel Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29142" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29142" } ], "metrics": [ @@ -246,7 +289,7 @@ "cveId": "CVE-2022-29142", "datePublished": "2022-05-10T20:34:54", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.266Z", + "dateUpdated": "2025-01-02T18:58:19.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29143.json b/cves/2022/29xxx/CVE-2022-29143.json index 29f9a90ac820..fb167a76b245 100644 --- a/cves/2022/29xxx/CVE-2022-29143.json +++ b/cves/2022/29xxx/CVE-2022-29143.json @@ -3,13 +3,82 @@ "cna": { "title": "Microsoft SQL Server Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server:*:-:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.0", + "versionEndExcluding": "14.0.2042.3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server:2014:sp3:*:*:*:*:x64:*", + "versionStartIncluding": "12.0.0", + "versionEndExcluding": "12.0.6169.19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server:*:sp2:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.0", + "versionEndExcluding": "13.0.5108.50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server:2014:sp3:*:*:*:*:x86:*", + "versionStartIncluding": "12.0.0", + "versionEndExcluding": "12.0.6439.10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "15.0.2095.3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.0.0", + "versionEndExcluding": "15.0.4236.7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server:*:-:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.0.0", + "versionEndExcluding": "14.0.3445.2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server:*:sp2:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.0.0", + "versionEndExcluding": "13.0.5893.48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server:*:sp3:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.0", + "versionEndExcluding": "13.0.6419.1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server:*:sp3:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.0", + "versionEndExcluding": "13.0.7016.1" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft SQL Server 2017 (GDR)", - "cpes": [ - "cpe:2.3:a:microsoft:sql_server:2017:-:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -25,10 +94,6 @@ { "vendor": "Microsoft", "product": "Microsoft SQL Server 2014 Service Pack 3 (GDR)", - "cpes": [ - "cpe:2.3:a:microsoft:sql_server:2014:sp3:*:*:*:*:x64:*", - "cpe:2.3:a:microsoft:sql_server:2014:sp3:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "32-bit Systems" @@ -45,9 +110,6 @@ { "vendor": "Microsoft", "product": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 2 (GDR)", - "cpes": [ - "cpe:2.3:a:microsoft:sql_server:2016:sp2:*:*:*:*:x64:*" - ], "platforms": [ "Unknown" ], @@ -63,10 +125,6 @@ { "vendor": "Microsoft", "product": "Microsoft SQL Server 2014 Service Pack 3 (CU 4)", - "cpes": [ - "cpe:2.3:a:microsoft:sql_server:2014:sp3:*:*:*:*:x86:*", - "cpe:2.3:a:microsoft:sql_server:2014:sp3:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" @@ -83,9 +141,6 @@ { "vendor": "Microsoft", "product": "Microsoft SQL Server 2019 (GDR)", - "cpes": [ - "cpe:2.3:a:microsoft:sql_server:2019:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -101,9 +156,6 @@ { "vendor": "Microsoft", "product": "Microsoft SQL Server 2019 (CU 16)", - "cpes": [ - "cpe:2.3:a:microsoft:sql_server:2019:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -119,9 +171,6 @@ { "vendor": "Microsoft", "product": "Microsoft SQL Server 2017 (CU 29)", - "cpes": [ - "cpe:2.3:a:microsoft:sql_server:2017:-:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], @@ -137,16 +186,13 @@ { "vendor": "Microsoft", "product": "Microsoft SQL Server 2016 Service Pack 2 (CU 17)", - "cpes": [ - "cpe:2.3:a:microsoft:sql_server:2016:sp2:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { "version": "13.0.0.0", - "lessThan": "publication", + "lessThan": "13.0.5893.48", "versionType": "custom", "status": "affected" } @@ -155,9 +201,6 @@ { "vendor": "Microsoft", "product": "Microsoft SQL Server 2016 Service Pack 3 (GDR)", - "cpes": [ - "cpe:2.3:a:microsoft:sql_server:2016:sp3:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -173,9 +216,6 @@ { "vendor": "Microsoft", "product": "Microsoft SQL Server 2016 Service Pack 3 Azure Connect Feature Pack", - "cpes": [ - "cpe:2.3:a:microsoft:sql_server:2016:sp3:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -209,14 +249,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:27.314Z" + "dateUpdated": "2025-01-02T19:03:12.592Z" }, "references": [ { + "name": "Microsoft SQL Server Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29143" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29143" } ], "metrics": [ @@ -263,7 +304,7 @@ "cveId": "CVE-2022-29143", "datePublished": "2022-06-15T21:51:15", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-09-10T15:57:27.314Z", + "dateUpdated": "2025-01-02T19:03:12.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29145.json b/cves/2022/29xxx/CVE-2022-29145.json index d8dfc55b2a14..1f677e309db7 100644 --- a/cves/2022/29xxx/CVE-2022-29145.json +++ b/cves/2022/29xxx/CVE-2022-29145.json @@ -3,13 +3,64 @@ "cna": { "title": ".NET and Visual Studio Denial of Service Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndExcluding": "6.0.5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1", + "versionEndExcluding": "3.1.25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.0.17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.1.7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "16.9.21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.11.0", + "versionEndExcluding": "16.11.14" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": ".NET 6.0", - "cpes": [ - "cpe:2.3:a:microsoft:.net:6.0.0:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -25,9 +76,6 @@ { "vendor": "Microsoft", "product": ".NET Core 3.1", - "cpes": [ - "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,9 +91,6 @@ { "vendor": "Microsoft", "product": ".NET 5.0", - "cpes": [ - "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -61,9 +106,6 @@ { "vendor": "Microsoft", "product": "Microsoft Visual Studio 2022 version 17.1", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2022:17.1:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -79,9 +121,6 @@ { "vendor": "Microsoft", "product": "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -97,9 +136,6 @@ { "vendor": "Microsoft", "product": "Microsoft Visual Studio 2022 version 17.0", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -115,9 +151,6 @@ { "vendor": "Microsoft", "product": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -151,38 +184,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:48.275Z" + "dateUpdated": "2025-01-02T18:58:19.924Z" }, "references": [ { + "name": ".NET and Visual Studio Denial of Service Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29145" - }, - { - "name": "FEDORA-2022-d69fee9f38", - "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" - ], - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/" - }, - { - "name": "FEDORA-2022-9a1d5ea33c", - "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" - ], - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/" - }, - { - "name": "FEDORA-2022-256d559f0c", - "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" + "vendor-advisory" ], - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29145" } ], "metrics": [ @@ -256,7 +266,7 @@ "cveId": "CVE-2022-29145", "datePublished": "2022-05-10T20:34:56", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.448Z", + "dateUpdated": "2025-01-02T18:58:19.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29148.json b/cves/2022/29xxx/CVE-2022-29148.json index 76e97a258f7f..ea3bbfa5ec60 100644 --- a/cves/2022/29xxx/CVE-2022-29148.json +++ b/cves/2022/29xxx/CVE-2022-29148.json @@ -3,13 +3,28 @@ "cna": { "title": "Visual Studio Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.9.0", + "versionEndExcluding": "15.9.48" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,14 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:48.808Z" + "dateUpdated": "2025-01-02T18:58:20.375Z" }, "references": [ { + "name": "Visual Studio Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29148" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29148" } ], "metrics": [ @@ -97,7 +113,7 @@ "cveId": "CVE-2022-29148", "datePublished": "2022-05-10T20:34:57", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.356Z", + "dateUpdated": "2025-01-02T18:58:20.375Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29149.json b/cves/2022/29xxx/CVE-2022-29149.json index 1a435b215f26..f416250dec83 100644 --- a/cves/2022/29xxx/CVE-2022-29149.json +++ b/cves/2022/29xxx/CVE-2022-29149.json @@ -3,13 +3,94 @@ "cna": { "title": "Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_automation_state_configuration:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "DSC Agent versions: 2.71.1.33, 3.0.0.7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_automation_update_management:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "OMS Agent for Linux GA v1.14.13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:log_analytics_agent:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "OMS Agent for Linux GA v1.14.13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_diagnostics:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "LAD v4.0.27 and LAD v3.0.137" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:container_monitoring_solution:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "publication" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_security_center:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "OMS Agent for Linux GA v1.14.13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_sentinel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "OMS Agent for Linux GA v1.14.13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "OMS Agent for Linux GA v1.14.13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0", + "versionEndExcluding": "OMI Version 1.6.9-1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:*:-:*:*:*:*:*:*", + "versionStartIncluding": "10.22.0", + "versionEndExcluding": "10.22.1024.0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:*:-:*:*:*:*:*:*", + "versionStartIncluding": "10.19.0", + "versionEndExcluding": "10.19.1152.0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:*:-:*:*:*:*:*:*", + "versionStartIncluding": "7.6.0", + "versionEndExcluding": "7.6.1108.0" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Azure Automation State Configuration, DSC Extension", - "cpes": [ - "cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -25,9 +106,6 @@ { "vendor": "Microsoft", "product": "Azure Automation Update Management", - "cpes": [ - "cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,9 +121,6 @@ { "vendor": "Microsoft", "product": "Log Analytics Agent", - "cpes": [ - "cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -61,9 +136,6 @@ { "vendor": "Microsoft", "product": "Azure Diagnostics (LAD)", - "cpes": [ - "cpe:2.3:a:microsoft:azure_diagnostics:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -79,9 +151,6 @@ { "vendor": "Microsoft", "product": "Container Monitoring Solution", - "cpes": [ - "cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -97,9 +166,6 @@ { "vendor": "Microsoft", "product": "Azure Security Center", - "cpes": [ - "cpe:2.3:a:microsoft:azure_security_center:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -115,9 +181,6 @@ { "vendor": "Microsoft", "product": "Azure Sentinel", - "cpes": [ - "cpe:2.3:a:microsoft:azure_sentinel:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -133,9 +196,6 @@ { "vendor": "Microsoft", "product": "Azure Stack Hub", - "cpes": [ - "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -151,9 +211,6 @@ { "vendor": "Microsoft", "product": "Open Management Infrastructure", - "cpes": [ - "cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -169,9 +226,6 @@ { "vendor": "Microsoft", "product": "System Center Operations Manager (SCOM) 2022", - "cpes": [ - "cpe:2.3:a:microsoft:system_center_operations_manager:2022:-:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -187,9 +241,6 @@ { "vendor": "Microsoft", "product": "System Center Operations Manager (SCOM) 2019", - "cpes": [ - "cpe:2.3:a:microsoft:system_center_operations_manager:2019:-:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -205,9 +256,6 @@ { "vendor": "Microsoft", "product": "System Center Operations Manager (SCOM) 2016", - "cpes": [ - "cpe:2.3:a:microsoft:system_center_operations_manager:2016:-:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -241,14 +289,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:27.888Z" + "dateUpdated": "2025-01-02T19:03:13.161Z" }, "references": [ { + "name": "Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29149" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29149" } ], "metrics": [ @@ -295,7 +344,7 @@ "cveId": "CVE-2022-29149", "datePublished": "2022-06-15T21:51:17", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-09-10T15:57:27.888Z", + "dateUpdated": "2025-01-02T19:03:13.161Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29150.json b/cves/2022/29xxx/CVE-2022-29150.json index 803444d59bf4..1f66c6c68328 100644 --- a/cves/2022/29xxx/CVE-2022-29150.json +++ b/cves/2022/29xxx/CVE-2022-29150.json @@ -3,19 +3,88 @@ "cna": { "title": "Windows Cluster Shared Volume (CSV) Elevation of Privilege Vulnerability", "datePublic": "2022-05-10T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -25,15 +94,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -43,15 +109,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -61,9 +124,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -79,15 +139,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -97,15 +154,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -115,15 +169,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -133,15 +184,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -151,50 +199,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -219,14 +247,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:49.343Z" + "dateUpdated": "2025-01-02T18:58:20.892Z" }, "references": [ { + "name": "Windows Cluster Shared Volume (CSV) Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29150" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29150" } ], "metrics": [ @@ -273,7 +302,7 @@ "cveId": "CVE-2022-29150", "datePublished": "2022-05-10T20:34:59", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.430Z", + "dateUpdated": "2025-01-02T18:58:20.892Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/29xxx/CVE-2022-29151.json b/cves/2022/29xxx/CVE-2022-29151.json index 2a452e89e6ce..406b78699ed6 100644 --- a/cves/2022/29xxx/CVE-2022-29151.json +++ b/cves/2022/29xxx/CVE-2022-29151.json @@ -3,19 +3,88 @@ "cna": { "title": "Windows Cluster Shared Volume (CSV) Elevation of Privilege Vulnerability", "datePublic": "2022-05-10T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -25,15 +94,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -43,15 +109,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -61,9 +124,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -79,15 +139,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -97,15 +154,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -115,15 +169,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -133,15 +184,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -151,50 +199,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -219,14 +247,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:49.885Z" + "dateUpdated": "2025-01-02T18:58:21.426Z" }, "references": [ { + "name": "Windows Cluster Shared Volume (CSV) Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29151" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29151" } ], "metrics": [ @@ -273,7 +302,7 @@ "cveId": "CVE-2022-29151", "datePublished": "2022-05-10T20:35:00", "dateReserved": "2022-04-12T00:00:00", - "dateUpdated": "2024-08-03T06:10:59.425Z", + "dateUpdated": "2025-01-02T18:58:21.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30127.json b/cves/2022/30xxx/CVE-2022-30127.json index 9b68848d6bfe..4b30dea2883b 100644 --- a/cves/2022/30xxx/CVE-2022-30127.json +++ b/cves/2022/30xxx/CVE-2022-30127.json @@ -3,13 +3,28 @@ "cna": { "title": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "datePublic": "2022-05-31T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "102.0.1245.30" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Edge (Chromium-based)", - "cpes": [ - "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,22 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:52.243Z" + "dateUpdated": "2025-01-02T18:58:23.678Z" }, "references": [ { + "name": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30127" - }, - { - "name": "GLSA-202208-25", - "tags": [ - "vendor-advisory", - "x_refsource_GENTOO" + "vendor-advisory" ], - "url": "https://security.gentoo.org/glsa/202208-25" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30127" } ], "metrics": [ @@ -114,7 +122,7 @@ "cveId": "CVE-2022-30127", "datePublished": "2022-06-01T20:10:14", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-08-03T06:40:47.458Z", + "dateUpdated": "2025-01-02T18:58:23.678Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30128.json b/cves/2022/30xxx/CVE-2022-30128.json index 15bc6bd6f29a..6ec5be467280 100644 --- a/cves/2022/30xxx/CVE-2022-30128.json +++ b/cves/2022/30xxx/CVE-2022-30128.json @@ -3,13 +3,28 @@ "cna": { "title": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "datePublic": "2022-05-31T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "102.0.1245.30" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Edge (Chromium-based)", - "cpes": [ - "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,22 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:51.705Z" + "dateUpdated": "2025-01-02T18:58:23.115Z" }, "references": [ { + "name": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30128" - }, - { - "name": "GLSA-202208-25", - "tags": [ - "vendor-advisory", - "x_refsource_GENTOO" + "vendor-advisory" ], - "url": "https://security.gentoo.org/glsa/202208-25" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30128" } ], "metrics": [ @@ -114,7 +122,7 @@ "cveId": "CVE-2022-30128", "datePublished": "2022-06-01T20:10:16", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-08-03T06:40:47.675Z", + "dateUpdated": "2025-01-02T18:58:23.115Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30129.json b/cves/2022/30xxx/CVE-2022-30129.json index 9a2d53df3332..390b98d5d4df 100644 --- a/cves/2022/30xxx/CVE-2022-30129.json +++ b/cves/2022/30xxx/CVE-2022-30129.json @@ -3,13 +3,28 @@ "cna": { "title": "Visual Studio Code Remote Code Execution Vulnerability", "datePublic": "2022-05-10T08:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "1.67.1" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Visual Studio Code", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,20 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:57.572Z" + "dateUpdated": "2025-01-02T18:58:29.243Z" }, "references": [ { + "name": "Visual Studio Code Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30129" - }, - { - "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://blog.sonarsource.com/securing-developer-tools-argument-injection-in-vscode/" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30129" } ], "metrics": [ @@ -142,7 +152,7 @@ "cveId": "CVE-2022-30129", "datePublished": "2022-05-10T20:35:03", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-11-20T15:26:56.827Z", + "dateUpdated": "2025-01-02T18:58:29.243Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30130.json b/cves/2022/30xxx/CVE-2022-30130.json index c55764bbcb0f..44916067581a 100644 --- a/cves/2022/30xxx/CVE-2022-30130.json +++ b/cves/2022/30xxx/CVE-2022-30130.json @@ -112,7 +112,7 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2025-01-01T01:37:54.149Z" + "dateUpdated": "2025-01-02T18:58:22.482Z" }, "references": [ { @@ -168,7 +168,7 @@ "cveId": "CVE-2022-30130", "datePublished": "2022-05-10T20:35:04", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2025-01-01T01:37:54.149Z", + "dateUpdated": "2025-01-02T18:58:22.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30131.json b/cves/2022/30xxx/CVE-2022-30131.json index e84f362ad310..abf2891f9c6a 100644 --- a/cves/2022/30xxx/CVE-2022-30131.json +++ b/cves/2022/30xxx/CVE-2022-30131.json @@ -3,18 +3,111 @@ "cna": { "title": "Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +122,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +137,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +152,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +169,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +184,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +200,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,11 +215,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -155,33 +222,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -191,15 +248,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -209,15 +263,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -245,14 +296,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:05.639Z" + "dateUpdated": "2025-01-02T19:02:50.392Z" }, "references": [ { + "name": "Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30131" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30131" } ], "metrics": [ @@ -299,7 +351,7 @@ "cveId": "CVE-2022-30131", "datePublished": "2022-06-15T21:51:18", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:05.639Z", + "dateUpdated": "2025-01-02T19:02:50.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30132.json b/cves/2022/30xxx/CVE-2022-30132.json index 02f12935945b..f56dfe6ff27a 100644 --- a/cves/2022/30xxx/CVE-2022-30132.json +++ b/cves/2022/30xxx/CVE-2022-30132.json @@ -3,18 +3,99 @@ "cna": { "title": "Windows Container Manager Service Elevation of Privilege Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +110,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +125,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +140,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +157,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +172,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +188,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +203,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +219,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,16 +226,10 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] } @@ -209,14 +254,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:06.160Z" + "dateUpdated": "2025-01-02T19:02:51.096Z" }, "references": [ { + "name": "Windows Container Manager Service Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30132" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30132" } ], "metrics": [ @@ -263,7 +309,7 @@ "cveId": "CVE-2022-30132", "datePublished": "2022-06-15T21:51:19", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:06.160Z", + "dateUpdated": "2025-01-02T19:02:51.096Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30135.json b/cves/2022/30xxx/CVE-2022-30135.json index 1e44b50be0dc..42801d08ba25 100644 --- a/cves/2022/30xxx/CVE-2022-30135.json +++ b/cves/2022/30xxx/CVE-2022-30135.json @@ -3,13 +3,76 @@ "cna": { "title": "Windows Media Center Elevation of Privilege Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -25,9 +88,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -43,11 +103,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -65,15 +120,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -83,15 +135,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -101,15 +150,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -119,15 +165,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -137,15 +180,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -155,15 +195,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -191,14 +228,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:06.751Z" + "dateUpdated": "2025-01-02T19:02:51.702Z" }, "references": [ { + "name": "Windows Media Center Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30135" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30135" } ], "metrics": [ @@ -277,7 +315,7 @@ "cveId": "CVE-2022-30135", "datePublished": "2022-06-15T21:51:21", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-11-20T15:20:32.205Z", + "dateUpdated": "2025-01-02T19:02:51.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30136.json b/cves/2022/30xxx/CVE-2022-30136.json index 57b4626b92bb..b2cdac10384f 100644 --- a/cves/2022/30xxx/CVE-2022-30136.json +++ b/cves/2022/30xxx/CVE-2022-30136.json @@ -3,19 +3,76 @@ "cna": { "title": "Windows Network File System Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -25,15 +82,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -43,15 +97,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -61,15 +112,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -79,15 +127,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -97,15 +142,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -115,15 +157,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -133,15 +172,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -169,14 +205,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:07.275Z" + "dateUpdated": "2025-01-02T19:02:52.437Z" }, "references": [ { + "name": "Windows Network File System Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30136" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30136" } ], "metrics": [ @@ -223,7 +260,7 @@ "cveId": "CVE-2022-30136", "datePublished": "2022-06-15T21:51:22", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:07.275Z", + "dateUpdated": "2025-01-02T19:02:52.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30137.json b/cves/2022/30xxx/CVE-2022-30137.json index 7913bfa7e2aa..f0f213aed003 100644 --- a/cves/2022/30xxx/CVE-2022-30137.json +++ b/cves/2022/30xxx/CVE-2022-30137.json @@ -3,13 +3,27 @@ "cna": { "title": "Azure Service Fabric Container Elevation of Privilege Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:service_fabric:*:*:*:*:*:*:*:*", + "versionStartIncluding": "N/A" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Service Fabric", - "cpes": [ - "cpe:2.3:a:microsoft:service_fabric:-:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -41,14 +55,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:07.864Z" + "dateUpdated": "2025-01-02T19:02:52.975Z" }, "references": [ { + "name": "Azure Service Fabric Container Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30137" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30137" } ], "metrics": [ @@ -95,7 +110,7 @@ "cveId": "CVE-2022-30137", "datePublished": "2022-06-15T21:51:24", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:07.864Z", + "dateUpdated": "2025-01-02T19:02:52.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30138.json b/cves/2022/30xxx/CVE-2022-30138.json index 89906eb1ec9d..6c125273bea9 100644 --- a/cves/2022/30xxx/CVE-2022-30138.json +++ b/cves/2022/30xxx/CVE-2022-30138.json @@ -3,18 +3,201 @@ "cna": { "title": "Windows Print Spooler Elevation of Privilege Vulnerability", "datePublic": "2022-05-12T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.2928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.18363.2274" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19297" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21481" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20371" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2928:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.2928", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +212,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -47,15 +227,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2928:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.2928", "versionType": "custom", "status": "affected" @@ -65,11 +242,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1909", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2274:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -87,11 +259,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1706:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -109,15 +276,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.707:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.707", "versionType": "custom", "status": "affected" @@ -127,10 +291,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1706:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -147,9 +307,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1706:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -165,10 +322,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.675:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -185,44 +338,30 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1706:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1706:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1706", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1706", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19297:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19297", "versionType": "custom", "status": "affected" @@ -232,17 +371,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5125:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -252,15 +387,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -270,15 +402,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5125:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5125", "versionType": "custom", "status": "affected" @@ -288,9 +417,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -306,9 +432,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25954:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -324,13 +447,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20365:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20367:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -342,33 +458,18 @@ "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20367", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -378,17 +479,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -398,15 +495,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21481:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21481", "versionType": "custom", "status": "affected" @@ -416,15 +510,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -434,15 +525,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25954:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25954", "versionType": "custom", "status": "affected" @@ -452,15 +540,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -470,15 +555,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23714:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23714", "versionType": "custom", "status": "affected" @@ -488,50 +570,30 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20371:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20365:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20371", "versionType": "custom", "status": "affected" - }, - { - "version": "6.3.0", - "lessThan": "6.3.9600.20365", - "versionType": "custom", - "status": "affected" } ] } @@ -556,14 +618,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:58.109Z" + "dateUpdated": "2025-01-02T18:58:29.785Z" }, "references": [ { + "name": "Windows Print Spooler Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30138" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30138" } ], "metrics": [ @@ -610,7 +673,7 @@ "cveId": "CVE-2022-30138", "datePublished": "2022-05-18T23:10:09", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-08-03T06:40:47.567Z", + "dateUpdated": "2025-01-02T18:58:29.785Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30139.json b/cves/2022/30xxx/CVE-2022-30139.json index 94fc1a8be265..9ad375b7ade6 100644 --- a/cves/2022/30xxx/CVE-2022-30139.json +++ b/cves/2022/30xxx/CVE-2022-30139.json @@ -3,18 +3,123 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +134,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +149,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +164,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +181,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +196,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +212,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +227,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +243,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +250,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +276,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +292,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +307,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -285,14 +340,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:28.363Z" + "dateUpdated": "2025-01-02T19:03:13.604Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30139" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30139" } ], "metrics": [ @@ -339,7 +395,7 @@ "cveId": "CVE-2022-30139", "datePublished": "2022-06-15T21:51:25", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:28.363Z", + "dateUpdated": "2025-01-02T19:03:13.604Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30140.json b/cves/2022/30xxx/CVE-2022-30140.json index 7485d253c8dd..573a7482ed52 100644 --- a/cves/2022/30xxx/CVE-2022-30140.json +++ b/cves/2022/30xxx/CVE-2022-30140.json @@ -3,18 +3,195 @@ "cna": { "title": "Windows iSCSI Discovery Service Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +206,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +221,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +236,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +253,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +284,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +299,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +315,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +322,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +348,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +394,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +409,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +424,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +441,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -343,17 +456,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -363,15 +472,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -381,15 +487,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -399,15 +502,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -417,15 +517,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -435,15 +532,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -453,15 +547,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -471,15 +562,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -507,14 +595,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:08.463Z" + "dateUpdated": "2025-01-02T19:02:53.692Z" }, "references": [ { + "name": "Windows iSCSI Discovery Service Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30140" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30140" } ], "metrics": [ @@ -561,7 +650,7 @@ "cveId": "CVE-2022-30140", "datePublished": "2022-06-15T21:51:27", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:08.463Z", + "dateUpdated": "2025-01-02T19:02:53.692Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30141.json b/cves/2022/30xxx/CVE-2022-30141.json index 740991b39cd8..92b40b40eaf2 100644 --- a/cves/2022/30xxx/CVE-2022-30141.json +++ b/cves/2022/30xxx/CVE-2022-30141.json @@ -3,18 +3,195 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +206,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +221,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +236,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +253,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +284,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +299,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +315,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +322,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +348,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +394,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +409,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +424,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +441,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -343,17 +456,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -363,15 +472,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -381,15 +487,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -399,15 +502,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -417,15 +517,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -435,15 +532,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -453,15 +547,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -471,15 +562,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -507,14 +595,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:09.066Z" + "dateUpdated": "2025-01-02T19:02:54.273Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30141" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30141" } ], "metrics": [ @@ -561,7 +650,7 @@ "cveId": "CVE-2022-30141", "datePublished": "2022-06-15T21:51:28", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:09.066Z", + "dateUpdated": "2025-01-02T19:02:54.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30142.json b/cves/2022/30xxx/CVE-2022-30142.json index 64af81c774df..ae15991983e9 100644 --- a/cves/2022/30xxx/CVE-2022-30142.json +++ b/cves/2022/30xxx/CVE-2022-30142.json @@ -3,18 +3,177 @@ "cna": { "title": "Windows File History Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +188,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +203,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +218,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +235,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +250,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +266,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +281,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +297,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +304,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +330,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +346,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +361,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +376,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +391,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +406,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +423,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -343,15 +438,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -361,15 +453,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -379,15 +468,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -397,15 +483,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -415,15 +498,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -451,14 +531,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:09.629Z" + "dateUpdated": "2025-01-02T19:02:54.865Z" }, "references": [ { + "name": "Windows File History Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30142" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30142" } ], "metrics": [ @@ -537,7 +618,7 @@ "cveId": "CVE-2022-30142", "datePublished": "2022-06-15T21:51:30", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-10-01T15:51:00.018Z", + "dateUpdated": "2025-01-02T19:02:54.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30143.json b/cves/2022/30xxx/CVE-2022-30143.json index c6988a682038..a0b973399b9e 100644 --- a/cves/2022/30xxx/CVE-2022-30143.json +++ b/cves/2022/30xxx/CVE-2022-30143.json @@ -3,18 +3,195 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +206,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +221,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +236,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +253,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +284,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +299,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +315,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +322,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +348,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +394,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +409,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +424,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +441,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -343,17 +456,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -363,15 +472,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -381,15 +487,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -399,15 +502,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -417,15 +517,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -435,15 +532,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -453,15 +547,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -471,15 +562,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -507,14 +595,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:10.217Z" + "dateUpdated": "2025-01-02T19:02:55.334Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30143" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30143" } ], "metrics": [ @@ -561,7 +650,7 @@ "cveId": "CVE-2022-30143", "datePublished": "2022-06-15T21:51:31", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:10.217Z", + "dateUpdated": "2025-01-02T19:02:55.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30145.json b/cves/2022/30xxx/CVE-2022-30145.json index a7862316b142..eae0801284e3 100644 --- a/cves/2022/30xxx/CVE-2022-30145.json +++ b/cves/2022/30xxx/CVE-2022-30145.json @@ -3,18 +3,117 @@ "cna": { "title": "Windows Encrypting File System (EFS) Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +128,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +143,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +158,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +175,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +190,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +206,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +221,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +237,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +244,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -211,15 +270,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -229,15 +285,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -265,14 +318,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:10.758Z" + "dateUpdated": "2025-01-02T19:02:55.780Z" }, "references": [ { + "name": "Windows Encrypting File System (EFS) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30145" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30145" } ], "metrics": [ @@ -319,7 +373,7 @@ "cveId": "CVE-2022-30145", "datePublished": "2022-06-15T21:51:33", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:10.758Z", + "dateUpdated": "2025-01-02T19:02:55.780Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30146.json b/cves/2022/30xxx/CVE-2022-30146.json index 7305625e512d..d5ff96d7491e 100644 --- a/cves/2022/30xxx/CVE-2022-30146.json +++ b/cves/2022/30xxx/CVE-2022-30146.json @@ -3,18 +3,195 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +206,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +221,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +236,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +253,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +284,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +299,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +315,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +322,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +348,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +394,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +409,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +424,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +441,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -343,17 +456,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -363,15 +472,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -381,15 +487,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -399,15 +502,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -417,15 +517,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -435,15 +532,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -453,15 +547,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -471,15 +562,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -507,14 +595,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:28.912Z" + "dateUpdated": "2025-01-02T19:03:14.068Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30146" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30146" } ], "metrics": [ @@ -561,7 +650,7 @@ "cveId": "CVE-2022-30146", "datePublished": "2022-06-15T21:51:34", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:28.912Z", + "dateUpdated": "2025-01-02T19:03:14.068Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30147.json b/cves/2022/30xxx/CVE-2022-30147.json index f9b94d334d2c..05875cf79e0c 100644 --- a/cves/2022/30xxx/CVE-2022-30147.json +++ b/cves/2022/30xxx/CVE-2022-30147.json @@ -3,18 +3,195 @@ "cna": { "title": "Windows Installer Elevation of Privilege Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +206,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +221,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +236,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +253,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +284,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +299,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +315,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +322,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +348,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +394,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +409,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +424,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +441,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -343,17 +456,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -363,15 +472,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -381,15 +487,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -399,15 +502,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -417,15 +517,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -435,15 +532,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -453,15 +547,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -471,15 +562,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -507,14 +595,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:29.498Z" + "dateUpdated": "2025-01-02T19:03:14.568Z" }, "references": [ { + "name": "Windows Installer Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30147" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30147" } ], "metrics": [ @@ -593,7 +682,7 @@ "cveId": "CVE-2022-30147", "datePublished": "2022-06-15T21:51:36", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-11-20T15:20:10.328Z", + "dateUpdated": "2025-01-02T19:03:14.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30148.json b/cves/2022/30xxx/CVE-2022-30148.json index 04488f013ce7..636956f4ecdf 100644 --- a/cves/2022/30xxx/CVE-2022-30148.json +++ b/cves/2022/30xxx/CVE-2022-30148.json @@ -3,18 +3,117 @@ "cna": { "title": "Windows Desired State Configuration (DSC) Information Disclosure Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +128,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +143,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +158,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +175,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +190,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +206,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +221,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +237,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +244,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -211,15 +270,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -229,15 +285,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -265,14 +318,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:11.414Z" + "dateUpdated": "2025-01-02T19:02:56.425Z" }, "references": [ { + "name": "Windows Desired State Configuration (DSC) Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30148" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30148" } ], "metrics": [ @@ -319,7 +373,7 @@ "cveId": "CVE-2022-30148", "datePublished": "2022-06-15T21:51:37", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:11.414Z", + "dateUpdated": "2025-01-02T19:02:56.425Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30149.json b/cves/2022/30xxx/CVE-2022-30149.json index d55aca326b9b..e12d48c47282 100644 --- a/cves/2022/30xxx/CVE-2022-30149.json +++ b/cves/2022/30xxx/CVE-2022-30149.json @@ -3,18 +3,195 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +206,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +221,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +236,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +253,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +284,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +299,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +315,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +322,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +348,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +394,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +409,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +424,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +441,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -343,17 +456,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -363,15 +472,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -381,15 +487,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -399,15 +502,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -417,15 +517,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -435,15 +532,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -453,15 +547,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -471,15 +562,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -507,14 +595,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:11.944Z" + "dateUpdated": "2025-01-02T19:02:56.969Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30149" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30149" } ], "metrics": [ @@ -561,7 +650,7 @@ "cveId": "CVE-2022-30149", "datePublished": "2022-06-15T21:51:39", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:11.944Z", + "dateUpdated": "2025-01-02T19:02:56.969Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30150.json b/cves/2022/30xxx/CVE-2022-30150.json index 49b51de45896..ef50d284ba44 100644 --- a/cves/2022/30xxx/CVE-2022-30150.json +++ b/cves/2022/30xxx/CVE-2022-30150.json @@ -3,18 +3,117 @@ "cna": { "title": "Windows Defender Remote Credential Guard Elevation of Privilege Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +128,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +143,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +158,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +175,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +190,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +206,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +221,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +237,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +244,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -211,15 +270,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -229,15 +285,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -265,20 +318,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:12.394Z" + "dateUpdated": "2025-01-02T19:02:57.437Z" }, "references": [ { + "name": "Windows Defender Remote Credential Guard Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30150" - }, - { - "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "http://packetstormsecurity.com/files/167697/Windows-Defender-Remote-Credential-Guard-Authentication-Relay-Privilege-Escalation.html" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30150" } ], "metrics": [ @@ -332,7 +380,7 @@ "cveId": "CVE-2022-30150", "datePublished": "2022-06-15T21:51:40", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:12.394Z", + "dateUpdated": "2025-01-02T19:02:57.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30151.json b/cves/2022/30xxx/CVE-2022-30151.json index d44da026a3ba..76b1f9439469 100644 --- a/cves/2022/30xxx/CVE-2022-30151.json +++ b/cves/2022/30xxx/CVE-2022-30151.json @@ -3,18 +3,195 @@ "cna": { "title": "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +206,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +221,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +236,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +253,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +284,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +299,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +315,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +322,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +348,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +394,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +409,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +424,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +441,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -343,17 +456,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -363,15 +472,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -381,15 +487,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -399,15 +502,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -417,15 +517,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -435,15 +532,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -453,15 +547,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -471,15 +562,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -507,14 +595,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:12.925Z" + "dateUpdated": "2025-01-02T19:02:58.003Z" }, "references": [ { + "name": "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30151" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30151" } ], "metrics": [ @@ -561,7 +650,7 @@ "cveId": "CVE-2022-30151", "datePublished": "2022-06-15T21:51:42", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:12.925Z", + "dateUpdated": "2025-01-02T19:02:58.003Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30152.json b/cves/2022/30xxx/CVE-2022-30152.json index 1982dfd910d1..0157b4ab4ce3 100644 --- a/cves/2022/30xxx/CVE-2022-30152.json +++ b/cves/2022/30xxx/CVE-2022-30152.json @@ -3,18 +3,195 @@ "cna": { "title": "Windows Network Address Translation (NAT) Denial of Service Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +206,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +221,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +236,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +253,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +284,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +299,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +315,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +322,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +348,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +394,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +409,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +424,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +441,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -343,17 +456,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -363,15 +472,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -381,15 +487,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -399,15 +502,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -417,15 +517,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -435,15 +532,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -453,15 +547,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -471,15 +562,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -507,14 +595,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:13.444Z" + "dateUpdated": "2025-01-02T19:02:58.633Z" }, "references": [ { + "name": "Windows Network Address Translation (NAT) Denial of Service Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30152" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30152" } ], "metrics": [ @@ -561,7 +650,7 @@ "cveId": "CVE-2022-30152", "datePublished": "2022-06-15T21:51:43", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:13.444Z", + "dateUpdated": "2025-01-02T19:02:58.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30153.json b/cves/2022/30xxx/CVE-2022-30153.json index b9cf8755fd23..2ebd692f10e1 100644 --- a/cves/2022/30xxx/CVE-2022-30153.json +++ b/cves/2022/30xxx/CVE-2022-30153.json @@ -3,18 +3,195 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +206,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +221,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +236,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +253,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +284,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +299,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +315,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +322,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +348,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +394,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +409,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +424,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +441,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -343,17 +456,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -363,15 +472,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -381,15 +487,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -399,15 +502,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -417,15 +517,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -435,15 +532,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -453,15 +547,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -471,15 +562,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -507,14 +595,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:14.065Z" + "dateUpdated": "2025-01-02T19:02:59.220Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30153" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30153" } ], "metrics": [ @@ -561,7 +650,7 @@ "cveId": "CVE-2022-30153", "datePublished": "2022-06-15T21:51:45", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:14.065Z", + "dateUpdated": "2025-01-02T19:02:59.220Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30154.json b/cves/2022/30xxx/CVE-2022-30154.json index 63494a8b1fa6..e861eba37d34 100644 --- a/cves/2022/30xxx/CVE-2022-30154.json +++ b/cves/2022/30xxx/CVE-2022-30154.json @@ -3,19 +3,88 @@ "cna": { "title": "Microsoft File Server Shadow Copy Agent Service (RVSS) Elevation of Privilege Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -25,15 +94,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -43,15 +109,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -61,9 +124,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -79,15 +139,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -97,15 +154,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -115,15 +169,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -133,15 +184,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -151,15 +199,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -169,15 +214,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -205,14 +247,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:14.611Z" + "dateUpdated": "2025-01-02T19:02:59.809Z" }, "references": [ { + "name": "Microsoft File Server Shadow Copy Agent Service (RVSS) Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30154" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30154" } ], "metrics": [ @@ -259,7 +302,7 @@ "cveId": "CVE-2022-30154", "datePublished": "2022-06-15T21:51:46", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:14.611Z", + "dateUpdated": "2025-01-02T19:02:59.809Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30155.json b/cves/2022/30xxx/CVE-2022-30155.json index 405f1126fd5c..98e84dee0074 100644 --- a/cves/2022/30xxx/CVE-2022-30155.json +++ b/cves/2022/30xxx/CVE-2022-30155.json @@ -3,18 +3,195 @@ "cna": { "title": "Windows Kernel Denial of Service Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +206,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +221,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +236,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +253,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +284,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +299,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +315,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +322,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +348,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +394,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +409,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +424,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +441,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -343,17 +456,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -363,15 +472,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -381,15 +487,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -399,15 +502,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -417,15 +517,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -435,15 +532,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -453,15 +547,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -471,15 +562,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -507,20 +595,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:15.210Z" + "dateUpdated": "2025-01-02T19:03:00.462Z" }, "references": [ { + "name": "Windows Kernel Denial of Service Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30155" - }, - { - "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "http://packetstormsecurity.com/files/167755/Windows-Kernel-nt-MiRelocateImage-Invalid-Read.html" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30155" } ], "metrics": [ @@ -574,7 +657,7 @@ "cveId": "CVE-2022-30155", "datePublished": "2022-06-15T21:51:48", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:15.210Z", + "dateUpdated": "2025-01-02T19:03:00.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30157.json b/cves/2022/30xxx/CVE-2022-30157.json index 5f5e1a4142b1..337f294bc268 100644 --- a/cves/2022/30xxx/CVE-2022-30157.json +++ b/cves/2022/30xxx/CVE-2022-30157.json @@ -3,13 +3,46 @@ "cna": { "title": "Microsoft SharePoint Server Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.5332.1001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:sp1:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "15.0.5459.1001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.10387.20008" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.14931.20418" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft SharePoint Enterprise Server 2016", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -25,9 +58,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Enterprise Server 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:enterprise:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -43,9 +73,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Server 2019", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -61,9 +88,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Server Subscription Edition", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -97,14 +121,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:15.737Z" + "dateUpdated": "2025-01-02T19:03:01.074Z" }, "references": [ { + "name": "Microsoft SharePoint Server Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30157" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30157" } ], "metrics": [ @@ -151,7 +176,7 @@ "cveId": "CVE-2022-30157", "datePublished": "2022-06-15T21:51:49", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:15.737Z", + "dateUpdated": "2025-01-02T19:03:01.074Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30158.json b/cves/2022/30xxx/CVE-2022-30158.json index 18f2e2fa5f28..31391ad010ee 100644 --- a/cves/2022/30xxx/CVE-2022-30158.json +++ b/cves/2022/30xxx/CVE-2022-30158.json @@ -3,13 +3,52 @@ "cna": { "title": "Microsoft SharePoint Server Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.5332.1001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.10387.20008" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.14931.20418" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_foundation:*:sp1:*:*:*:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "15.0.5459.1001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:sp1:*:*:*:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "15.0.5459.1001" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft SharePoint Enterprise Server 2016", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -25,9 +64,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Server 2019", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -43,9 +79,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Server Subscription Edition", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -61,9 +94,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Foundation 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -79,9 +109,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Server 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -115,14 +142,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:16.275Z" + "dateUpdated": "2025-01-02T19:03:01.749Z" }, "references": [ { + "name": "Microsoft SharePoint Server Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30158" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30158" } ], "metrics": [ @@ -201,7 +229,7 @@ "cveId": "CVE-2022-30158", "datePublished": "2022-06-15T21:51:51", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-11-20T15:19:47.415Z", + "dateUpdated": "2025-01-02T19:03:01.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30159.json b/cves/2022/30xxx/CVE-2022-30159.json index 3482050b6019..4ab1811722d2 100644 --- a/cves/2022/30xxx/CVE-2022-30159.json +++ b/cves/2022/30xxx/CVE-2022-30159.json @@ -3,13 +3,58 @@ "cna": { "title": "Microsoft Office Information Disclosure Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.5332.1001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:sp1:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "15.0.5459.1001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.10387.20008" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.1", + "versionEndExcluding": "16.0.14931.20612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_web_apps_server:*:sp1:*:*:*:*:*:*", + "versionStartIncluding": "15.0.1", + "versionEndExcluding": "15.0.5459.1001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.14931.20418" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft SharePoint Enterprise Server 2016", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -25,9 +70,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Enterprise Server 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:enterprise:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -43,9 +85,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Server 2019", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -61,9 +100,6 @@ { "vendor": "Microsoft", "product": "Microsoft Office Online Server", - "cpes": [ - "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -79,9 +115,6 @@ { "vendor": "Microsoft", "product": "Microsoft Office Web Apps Server 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -97,9 +130,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Server Subscription Edition", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -133,14 +163,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:16.789Z" + "dateUpdated": "2025-01-02T19:03:02.371Z" }, "references": [ { + "name": "Microsoft Office Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30159" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30159" } ], "metrics": [ @@ -187,7 +218,7 @@ "cveId": "CVE-2022-30159", "datePublished": "2022-06-15T21:51:52", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:16.789Z", + "dateUpdated": "2025-01-02T19:03:02.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30160.json b/cves/2022/30xxx/CVE-2022-30160.json index bc5cf1c08961..97101c6453d2 100644 --- a/cves/2022/30xxx/CVE-2022-30160.json +++ b/cves/2022/30xxx/CVE-2022-30160.json @@ -3,18 +3,195 @@ "cna": { "title": "Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +206,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +221,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +236,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +253,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +284,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +299,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +315,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +322,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +348,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +394,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +409,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +424,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +441,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -343,17 +456,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -363,15 +472,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -381,15 +487,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -399,15 +502,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -417,15 +517,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -435,15 +532,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -453,15 +547,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -471,15 +562,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -507,14 +595,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:17.314Z" + "dateUpdated": "2025-01-02T19:03:02.865Z" }, "references": [ { + "name": "Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30160" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30160" } ], "metrics": [ @@ -561,7 +650,7 @@ "cveId": "CVE-2022-30160", "datePublished": "2022-06-15T21:51:53", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:17.314Z", + "dateUpdated": "2025-01-02T19:03:02.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30161.json b/cves/2022/30xxx/CVE-2022-30161.json index 90ef89d03266..44fd6da3cb03 100644 --- a/cves/2022/30xxx/CVE-2022-30161.json +++ b/cves/2022/30xxx/CVE-2022-30161.json @@ -3,18 +3,195 @@ "cna": { "title": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +206,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +221,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +236,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +253,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +284,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +299,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +315,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +322,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +348,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +394,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +409,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +424,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +441,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -343,17 +456,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -363,15 +472,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -381,15 +487,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -399,15 +502,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -417,15 +517,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -435,15 +532,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -453,15 +547,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -471,15 +562,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -507,14 +595,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:17.907Z" + "dateUpdated": "2025-01-02T19:03:03.409Z" }, "references": [ { + "name": "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30161" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30161" } ], "metrics": [ @@ -561,7 +650,7 @@ "cveId": "CVE-2022-30161", "datePublished": "2022-06-15T21:51:55", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:17.907Z", + "dateUpdated": "2025-01-02T19:03:03.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30162.json b/cves/2022/30xxx/CVE-2022-30162.json index e05c24d6354a..74cb6bc9cb91 100644 --- a/cves/2022/30xxx/CVE-2022-30162.json +++ b/cves/2022/30xxx/CVE-2022-30162.json @@ -3,18 +3,141 @@ "cna": { "title": "Windows Kernel Information Disclosure Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +152,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +167,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +182,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +199,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +214,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +230,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +245,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +261,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +268,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +294,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +310,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +325,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,11 +340,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -289,15 +357,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -307,15 +372,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -343,14 +405,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:18.520Z" + "dateUpdated": "2025-01-02T19:03:03.945Z" }, "references": [ { + "name": "Windows Kernel Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30162" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30162" } ], "metrics": [ @@ -429,7 +492,7 @@ "cveId": "CVE-2022-30162", "datePublished": "2022-06-15T21:51:56", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-10-01T15:50:54.200Z", + "dateUpdated": "2025-01-02T19:03:03.945Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30163.json b/cves/2022/30xxx/CVE-2022-30163.json index 17f59ab743c5..17aaa3c95b0d 100644 --- a/cves/2022/30xxx/CVE-2022-30163.json +++ b/cves/2022/30xxx/CVE-2022-30163.json @@ -3,19 +3,148 @@ "cna": { "title": "Windows Hyper-V Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19044.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -25,15 +154,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -43,15 +169,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -61,9 +184,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -79,15 +199,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -97,9 +214,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -115,9 +229,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -133,15 +244,12 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19044.1766", "versionType": "custom", "status": "affected" @@ -151,15 +259,12 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -169,15 +274,12 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -187,15 +289,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -205,15 +304,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -223,9 +319,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -241,9 +334,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -259,15 +349,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -277,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -295,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -313,15 +394,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -331,15 +409,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -349,15 +424,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -385,14 +457,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:18.979Z" + "dateUpdated": "2025-01-02T19:03:04.419Z" }, "references": [ { + "name": "Windows Hyper-V Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30163" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30163" } ], "metrics": [ @@ -439,7 +512,7 @@ "cveId": "CVE-2022-30163", "datePublished": "2022-06-15T21:51:58", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:18.979Z", + "dateUpdated": "2025-01-02T19:03:04.419Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30164.json b/cves/2022/30xxx/CVE-2022-30164.json index f393f56eee16..e229986506b0 100644 --- a/cves/2022/30xxx/CVE-2022-30164.json +++ b/cves/2022/30xxx/CVE-2022-30164.json @@ -3,18 +3,153 @@ "cna": { "title": "Kerberos AppContainer Security Feature Bypass Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +164,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +179,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +194,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +211,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +226,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +242,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +257,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +273,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +280,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +306,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +322,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +337,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,11 +352,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -289,15 +369,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -307,15 +384,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -325,15 +399,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -343,15 +414,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -379,14 +447,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:19.570Z" + "dateUpdated": "2025-01-02T19:03:05.004Z" }, "references": [ { + "name": "Kerberos AppContainer Security Feature Bypass Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30164" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30164" } ], "metrics": [ @@ -433,7 +502,7 @@ "cveId": "CVE-2022-30164", "datePublished": "2022-06-15T21:51:59", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:19.570Z", + "dateUpdated": "2025-01-02T19:03:05.004Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30165.json b/cves/2022/30xxx/CVE-2022-30165.json index e4d7cd31eead..9b565cceaa54 100644 --- a/cves/2022/30xxx/CVE-2022-30165.json +++ b/cves/2022/30xxx/CVE-2022-30165.json @@ -3,18 +3,117 @@ "cna": { "title": "Windows Kerberos Elevation of Privilege Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +128,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +143,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +158,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +175,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +190,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +206,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +221,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +237,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +244,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -211,15 +270,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -229,15 +285,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -265,20 +318,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:20.764Z" + "dateUpdated": "2025-01-02T19:03:05.918Z" }, "references": [ { + "name": "Windows Kerberos Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30165" - }, - { - "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30165" } ], "metrics": [ @@ -332,7 +380,7 @@ "cveId": "CVE-2022-30165", "datePublished": "2022-06-15T21:52:01", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:20.764Z", + "dateUpdated": "2025-01-02T19:03:05.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30166.json b/cves/2022/30xxx/CVE-2022-30166.json index 4755bbcf0bd1..3eadc15d0543 100644 --- a/cves/2022/30xxx/CVE-2022-30166.json +++ b/cves/2022/30xxx/CVE-2022-30166.json @@ -3,18 +3,195 @@ "cna": { "title": "Local Security Authority Subsystem Service Elevation of Privilege Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.0.6003.0", + "versionEndExcluding": "6.0.6003.21507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +206,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +221,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +236,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +253,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +268,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +284,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +299,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,11 +315,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -175,33 +322,23 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] }, { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -211,17 +348,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -231,15 +364,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -249,15 +379,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -267,9 +394,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -285,9 +409,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -303,11 +424,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -325,15 +441,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -343,17 +456,13 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -363,15 +472,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 Service Pack 2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21507:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.0.6003.0", "lessThan": "6.0.6003.21507", "versionType": "custom", "status": "affected" @@ -381,15 +487,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -399,15 +502,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -417,15 +517,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -435,15 +532,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -453,15 +547,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -471,15 +562,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -507,20 +595,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:29.979Z" + "dateUpdated": "2025-01-02T19:03:15.232Z" }, "references": [ { + "name": "Local Security Authority Subsystem Service Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30166" - }, - { - "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "http://packetstormsecurity.com/files/167754/Windows-LSA-Service-LsapGetClientInfo-Impersonation-Level-Check-Privilege-Escalation.html" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30166" } ], "metrics": [ @@ -574,7 +657,7 @@ "cveId": "CVE-2022-30166", "datePublished": "2022-06-15T21:52:04", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:29.979Z", + "dateUpdated": "2025-01-02T19:03:15.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30167.json b/cves/2022/30xxx/CVE-2022-30167.json index d06b484f4348..bcff472f4763 100644 --- a/cves/2022/30xxx/CVE-2022-30167.json +++ b/cves/2022/30xxx/CVE-2022-30167.json @@ -3,13 +3,28 @@ "cna": { "title": "AV1 Video Extension Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:av1_video_extension:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.1.0", + "versionEndExcluding": "1.1.51091.0" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "AV1 Video Extension", - "cpes": [ - "cpe:2.3:a:microsoft:av1_video_extension:1.1.51091.0:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,14 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:20.143Z" + "dateUpdated": "2025-01-02T19:03:05.459Z" }, "references": [ { + "name": "AV1 Video Extension Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30167" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30167" } ], "metrics": [ @@ -97,7 +113,7 @@ "cveId": "CVE-2022-30167", "datePublished": "2022-06-15T21:52:05", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:20.143Z", + "dateUpdated": "2025-01-02T19:03:05.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30168.json b/cves/2022/30xxx/CVE-2022-30168.json index 52901007ab10..82b41d48b9b7 100644 --- a/cves/2022/30xxx/CVE-2022-30168.json +++ b/cves/2022/30xxx/CVE-2022-30168.json @@ -3,13 +3,28 @@ "cna": { "title": "Microsoft Photos App Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:photos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2022.0.0.0", + "versionEndExcluding": "2022.30050.31008.0" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Photos", - "cpes": [ - "cpe:2.3:a:microsoft:photos:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,14 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:30.456Z" + "dateUpdated": "2025-01-02T19:03:15.855Z" }, "references": [ { + "name": "Microsoft Photos App Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30168" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30168" } ], "metrics": [ @@ -97,7 +113,7 @@ "cveId": "CVE-2022-30168", "datePublished": "2022-06-15T21:52:07", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:30.456Z", + "dateUpdated": "2025-01-02T19:03:15.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30171.json b/cves/2022/30xxx/CVE-2022-30171.json index 2495d36d2244..bd54b54f6e6f 100644 --- a/cves/2022/30xxx/CVE-2022-30171.json +++ b/cves/2022/30xxx/CVE-2022-30171.json @@ -3,13 +3,58 @@ "cna": { "title": "Microsoft Office Information Disclosure Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.5332.1001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:sp1:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "15.0.5459.1001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.10387.20008" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.1", + "versionEndExcluding": "16.0.14931.20612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_web_apps_server:*:sp1:*:*:*:*:*:*", + "versionStartIncluding": "15.0.1", + "versionEndExcluding": "15.0.5459.1001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.14931.20418" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft SharePoint Enterprise Server 2016", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -25,9 +70,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Enterprise Server 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:enterprise:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -43,9 +85,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Server 2019", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -61,9 +100,6 @@ { "vendor": "Microsoft", "product": "Microsoft Office Online Server", - "cpes": [ - "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -79,9 +115,6 @@ { "vendor": "Microsoft", "product": "Microsoft Office Web Apps Server 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -97,9 +130,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Server Subscription Edition", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -133,14 +163,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:21.330Z" + "dateUpdated": "2025-01-02T19:03:06.479Z" }, "references": [ { + "name": "Microsoft Office Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30171" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30171" } ], "metrics": [ @@ -187,7 +218,7 @@ "cveId": "CVE-2022-30171", "datePublished": "2022-06-15T21:52:08", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:21.330Z", + "dateUpdated": "2025-01-02T19:03:06.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30172.json b/cves/2022/30xxx/CVE-2022-30172.json index 9e4f2a990a40..6ed3f5a82bf0 100644 --- a/cves/2022/30xxx/CVE-2022-30172.json +++ b/cves/2022/30xxx/CVE-2022-30172.json @@ -3,13 +3,58 @@ "cna": { "title": "Microsoft Office Information Disclosure Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.5332.1001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:sp1:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "15.0.5459.1001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.10387.20008" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.1", + "versionEndExcluding": "16.0.14931.20612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_web_apps_server:*:sp1:*:*:*:*:*:*", + "versionStartIncluding": "15.0.1", + "versionEndExcluding": "15.0.5459.1001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.0.14931.20418" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft SharePoint Enterprise Server 2016", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -25,9 +70,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Enterprise Server 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:enterprise:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -43,9 +85,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Server 2019", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -61,9 +100,6 @@ { "vendor": "Microsoft", "product": "Microsoft Office Online Server", - "cpes": [ - "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -79,9 +115,6 @@ { "vendor": "Microsoft", "product": "Microsoft Office Web Apps Server 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -97,9 +130,6 @@ { "vendor": "Microsoft", "product": "Microsoft SharePoint Server Subscription Edition", - "cpes": [ - "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -133,14 +163,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:21.844Z" + "dateUpdated": "2025-01-02T19:03:07.082Z" }, "references": [ { + "name": "Microsoft Office Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30172" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30172" } ], "metrics": [ @@ -219,7 +250,7 @@ "cveId": "CVE-2022-30172", "datePublished": "2022-06-15T21:52:10", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-11-20T15:19:15.506Z", + "dateUpdated": "2025-01-02T19:03:07.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30173.json b/cves/2022/30xxx/CVE-2022-30173.json index 898cc4e2248c..9c382a5c6dc8 100644 --- a/cves/2022/30xxx/CVE-2022-30173.json +++ b/cves/2022/30xxx/CVE-2022-30173.json @@ -3,14 +3,40 @@ "cna": { "title": "Microsoft Excel Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "16.0.0.0", + "versionEndExcluding": "16.0.5356.1000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:*:sp1:*:*:rt:*:*:*", + "versionStartIncluding": "15.0.0.0", + "versionEndExcluding": "15.0.5475.1000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_web_apps_server:*:sp1:*:*:*:*:*:*", + "versionStartIncluding": "15.0.1", + "versionEndExcluding": "15.0.5459.1001" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Excel 2016", - "cpes": [ - "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*", - "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" @@ -27,11 +53,6 @@ { "vendor": "Microsoft", "product": "Microsoft Excel 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", - "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x86:*", - "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x64:*" - ], "platforms": [ "ARM64-based Systems", "32-bit Systems", @@ -49,9 +70,6 @@ { "vendor": "Microsoft", "product": "Microsoft Office Web Apps Server 2013 Service Pack 1", - "cpes": [ - "cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -85,14 +103,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:22.345Z" + "dateUpdated": "2025-01-02T19:03:07.533Z" }, "references": [ { + "name": "Microsoft Excel Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30173" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30173" } ], "metrics": [ @@ -139,7 +158,7 @@ "cveId": "CVE-2022-30173", "datePublished": "2022-06-15T21:52:11", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:22.345Z", + "dateUpdated": "2025-01-02T19:03:07.533Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30174.json b/cves/2022/30xxx/CVE-2022-30174.json index c638b900c743..71c43834a1f8 100644 --- a/cves/2022/30xxx/CVE-2022-30174.json +++ b/cves/2022/30xxx/CVE-2022-30174.json @@ -3,13 +3,34 @@ "cna": { "title": "Microsoft Office Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.0.1", + "versionEndExcluding": "https://aka.ms/OfficeSecurityReleases" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.1", + "versionEndExcluding": "https://aka.ms/OfficeSecurityReleases" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft 365 Apps for Enterprise", - "cpes": [ - "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" @@ -26,9 +47,6 @@ { "vendor": "Microsoft", "product": "Microsoft Office LTSC 2021", - "cpes": [ - "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems", "32-bit Systems" @@ -63,14 +81,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:22.942Z" + "dateUpdated": "2025-01-02T19:03:08.271Z" }, "references": [ { + "name": "Microsoft Office Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30174" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30174" } ], "metrics": [ @@ -117,7 +136,7 @@ "cveId": "CVE-2022-30174", "datePublished": "2022-06-15T21:52:12", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:22.942Z", + "dateUpdated": "2025-01-02T19:03:08.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30177.json b/cves/2022/30xxx/CVE-2022-30177.json index e6b5156a9be8..86deda7c36be 100644 --- a/cves/2022/30xxx/CVE-2022-30177.json +++ b/cves/2022/30xxx/CVE-2022-30177.json @@ -3,13 +3,28 @@ "cna": { "title": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_rtos_guix_studio:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0.0", + "versionEndExcluding": "6.1.11.0" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Azure RTOS GUIX Studio", - "cpes": [ - "cpe:2.3:a:microsoft:azure_rtos_guix_studio:-:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,14 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:23.375Z" + "dateUpdated": "2025-01-02T19:03:08.895Z" }, "references": [ { + "name": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30177" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30177" } ], "metrics": [ @@ -97,7 +113,7 @@ "cveId": "CVE-2022-30177", "datePublished": "2022-06-15T21:52:14", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:23.375Z", + "dateUpdated": "2025-01-02T19:03:08.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30178.json b/cves/2022/30xxx/CVE-2022-30178.json index 12c6acb2100f..97aa8065b362 100644 --- a/cves/2022/30xxx/CVE-2022-30178.json +++ b/cves/2022/30xxx/CVE-2022-30178.json @@ -3,13 +3,28 @@ "cna": { "title": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_real_time_operating_system:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndExcluding": "6.1.11.0" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Azure Real Time Operating System", - "cpes": [ - "cpe:2.3:o:microsoft:azure_real_time_operating_system:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,14 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:23.963Z" + "dateUpdated": "2025-01-02T19:03:09.487Z" }, "references": [ { + "name": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30178" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30178" } ], "metrics": [ @@ -97,7 +113,7 @@ "cveId": "CVE-2022-30178", "datePublished": "2022-06-15T21:52:16", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:23.963Z", + "dateUpdated": "2025-01-02T19:03:09.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30179.json b/cves/2022/30xxx/CVE-2022-30179.json index d4701c16279b..3598f55bf4b0 100644 --- a/cves/2022/30xxx/CVE-2022-30179.json +++ b/cves/2022/30xxx/CVE-2022-30179.json @@ -3,13 +3,28 @@ "cna": { "title": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_rtos_guix_studio:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0.0", + "versionEndExcluding": "6.1.11.0" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Azure RTOS GUIX Studio", - "cpes": [ - "cpe:2.3:a:microsoft:azure_rtos_guix_studio:-:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,14 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:24.563Z" + "dateUpdated": "2025-01-02T19:03:10.001Z" }, "references": [ { + "name": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30179" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30179" } ], "metrics": [ @@ -129,7 +145,7 @@ "cveId": "CVE-2022-30179", "datePublished": "2022-06-15T21:52:17", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-11T15:10:01.852Z", + "dateUpdated": "2025-01-02T19:03:10.001Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30180.json b/cves/2022/30xxx/CVE-2022-30180.json index 4ee5cea624e2..e1198dcf9a9a 100644 --- a/cves/2022/30xxx/CVE-2022-30180.json +++ b/cves/2022/30xxx/CVE-2022-30180.json @@ -3,13 +3,28 @@ "cna": { "title": "Azure RTOS GUIX Studio Information Disclosure Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_rtos_guix_studio:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0.0", + "versionEndExcluding": "6.1.11.0" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Azure RTOS GUIX Studio", - "cpes": [ - "cpe:2.3:a:microsoft:azure_rtos_guix_studio:-:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,14 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:25.132Z" + "dateUpdated": "2025-01-02T19:03:10.512Z" }, "references": [ { + "name": "Azure RTOS GUIX Studio Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30180" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30180" } ], "metrics": [ @@ -97,7 +113,7 @@ "cveId": "CVE-2022-30180", "datePublished": "2022-06-15T21:52:19", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:25.132Z", + "dateUpdated": "2025-01-02T19:03:10.512Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30184.json b/cves/2022/30xxx/CVE-2022-30184.json index 6e42c9c95e09..e159806441f3 100644 --- a/cves/2022/30xxx/CVE-2022-30184.json +++ b/cves/2022/30xxx/CVE-2022-30184.json @@ -3,13 +3,76 @@ "cna": { "title": ".NET and Visual Studio Information Disclosure Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndExcluding": "6.0.6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1", + "versionEndExcluding": "3.1.26" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "16.9.22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:macos:*:*", + "versionStartIncluding": "8.1.0", + "versionEndExcluding": "17.0.2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.11.0", + "versionEndExcluding": "16.11.16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:nuget:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndExcluding": "6.2.0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.0.2" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": ".NET 6.0", - "cpes": [ - "cpe:2.3:a:microsoft:.net:6.0.0:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -25,9 +88,6 @@ { "vendor": "Microsoft", "product": ".NET Core 3.1", - "cpes": [ - "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,9 +103,6 @@ { "vendor": "Microsoft", "product": "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -61,9 +118,6 @@ { "vendor": "Microsoft", "product": "Visual Studio 2019 for Mac version 8.10", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2019:8.10:*:*:*:*:macos:*:*" - ], "platforms": [ "Unknown" ], @@ -79,9 +133,6 @@ { "vendor": "Microsoft", "product": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -97,9 +148,6 @@ { "vendor": "Microsoft", "product": "Microsoft Visual Studio 2022 version 17.0", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -115,9 +163,6 @@ { "vendor": "Microsoft", "product": "Microsoft Visual Studio 2022 version 17.2", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -133,9 +178,6 @@ { "vendor": "Microsoft", "product": "NuGet.exe", - "cpes": [ - "cpe:2.3:a:microsoft:nuget:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -151,9 +193,6 @@ { "vendor": "Microsoft", "product": "Visual Studio 2022 for Mac version 17.0", - "cpes": [ - "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -187,30 +226,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:25.636Z" + "dateUpdated": "2025-01-02T19:03:10.967Z" }, "references": [ { + "name": ".NET and Visual Studio Information Disclosure Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30184" - }, - { - "name": "FEDORA-2022-cd37732349", - "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" - ], - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWNH4AC3LFVX35MDRX5OBZDGD2AMH66K/" - }, - { - "name": "FEDORA-2022-5508547b1e", - "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" + "vendor-advisory" ], - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2/" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30184" } ], "metrics": [ @@ -275,7 +299,7 @@ "cveId": "CVE-2022-30184", "datePublished": "2022-06-15T21:52:20", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:25.636Z", + "dateUpdated": "2025-01-02T19:03:10.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30188.json b/cves/2022/30xxx/CVE-2022-30188.json index 8ad52f7cc022..54e5e39d0182 100644 --- a/cves/2022/30xxx/CVE-2022-30188.json +++ b/cves/2022/30xxx/CVE-2022-30188.json @@ -3,13 +3,34 @@ "cna": { "title": "HEVC Video Extensions Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0.0", + "versionEndExcluding": "2.0.51122.0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "2.0.51121.0" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "HEVC Video Extension", - "cpes": [ - "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -25,9 +46,6 @@ { "vendor": "Microsoft", "product": "HEVC Video Extensions", - "cpes": [ - "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -61,14 +79,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:26.151Z" + "dateUpdated": "2025-01-02T19:03:11.571Z" }, "references": [ { + "name": "HEVC Video Extensions Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30188" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30188" } ], "metrics": [ @@ -147,7 +166,7 @@ "cveId": "CVE-2022-30188", "datePublished": "2022-06-15T21:52:21", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-10-01T15:50:48.135Z", + "dateUpdated": "2025-01-02T19:03:11.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30189.json b/cves/2022/30xxx/CVE-2022-30189.json index 995011a907c1..3d8d9c82cdb7 100644 --- a/cves/2022/30xxx/CVE-2022-30189.json +++ b/cves/2022/30xxx/CVE-2022-30189.json @@ -3,15 +3,40 @@ "cna": { "title": "Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19043.1766" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -29,10 +54,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -49,11 +70,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19043.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems", @@ -61,16 +77,10 @@ ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19043.1766", "versionType": "custom", "status": "affected" - }, - { - "version": "10.0.0", - "lessThan": "10.0.19044.1766", - "versionType": "custom", - "status": "affected" } ] } @@ -95,14 +105,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:26.797Z" + "dateUpdated": "2025-01-02T19:03:12.155Z" }, "references": [ { + "name": "Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30189" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30189" } ], "metrics": [ @@ -149,7 +160,7 @@ "cveId": "CVE-2022-30189", "datePublished": "2022-06-15T21:52:23", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:26.797Z", + "dateUpdated": "2025-01-02T19:03:12.155Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30190.json b/cves/2022/30xxx/CVE-2022-30190.json index 8dc42fd73458..0957f02ce5f6 100644 --- a/cves/2022/30xxx/CVE-2022-30190.json +++ b/cves/2022/30xxx/CVE-2022-30190.json @@ -3,18 +3,177 @@ "cna": { "title": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "datePublic": "2022-05-30T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.17763.0", + "versionEndExcluding": "10.0.17763.3046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H1:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19043.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.20348.0", + "versionEndExcluding": "10.0.20348.770" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_20H2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.19042.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.22000.739" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.19043.0", + "versionEndExcluding": "10.0.19044.1766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.10240.0", + "versionEndExcluding": "10.0.10240.19325" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.14393.0", + "versionEndExcluding": "10.0.14393.5192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.1.7601.0", + "versionEndExcluding": "6.1.7601.25984" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.2.9200.0", + "versionEndExcluding": "6.2.9200.23736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "6.3.9600.0", + "versionEndExcluding": "6.3.9600.20402" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Windows 10 Version 1809", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3046:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", - "x64-based Systems", + "x64-based Systems" + ], + "versions": [ + { + "version": "10.0.17763.0", + "lessThan": "10.0.17763.3046", + "versionType": "custom", + "status": "affected" + } + ] + }, + { + "vendor": "Microsoft", + "product": "Windows 10 Version 1809", + "platforms": [ "ARM64-based Systems" ], "versions": [ @@ -29,15 +188,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -47,15 +203,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2019 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3046:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.17763.0", "lessThan": "10.0.17763.3046", "versionType": "custom", "status": "affected" @@ -65,11 +218,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1766:*:*:*:*:*:x86:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems", @@ -87,15 +235,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2022", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.770:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.20348.0", "lessThan": "10.0.20348.770", "versionType": "custom", "status": "affected" @@ -105,10 +250,6 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1766:*:*:*:*:*:arm64:*" - ], "platforms": [ "32-bit Systems", "ARM64-based Systems" @@ -125,9 +266,6 @@ { "vendor": "Microsoft", "product": "Windows Server version 20H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1766:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], @@ -143,10 +281,6 @@ { "vendor": "Microsoft", "product": "Windows 11 version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.739:*:*:*:*:*:arm64:*" - ], "platforms": [ "x64-based Systems", "ARM64-based Systems" @@ -163,18 +297,14 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 21H2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:arm64:*", - "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1766:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", - "ARM64-based Systems" + "ARM64-based Systems", + "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.19043.0", "lessThan": "10.0.19044.1766", "versionType": "custom", "status": "affected" @@ -184,17 +314,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1507", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19325:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.10240.0", "lessThan": "10.0.10240.19325", "versionType": "custom", "status": "affected" @@ -204,17 +330,13 @@ { "vendor": "Microsoft", "product": "Windows 10 Version 1607", - "cpes": [ - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5192:*:*:*:*:*:x64:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -224,15 +346,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -242,15 +361,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2016 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5192:*:*:*:*:*:*:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "10.0.0", + "version": "10.0.14393.0", "lessThan": "10.0.14393.5192", "versionType": "custom", "status": "affected" @@ -260,9 +376,6 @@ { "vendor": "Microsoft", "product": "Windows 7", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x86:*" - ], "platforms": [ "32-bit Systems" ], @@ -278,9 +391,6 @@ { "vendor": "Microsoft", "product": "Windows 7 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_7:6.1.7601.25984:sp1:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], @@ -296,11 +406,6 @@ { "vendor": "Microsoft", "product": "Windows 8.1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x86:*", - "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20402:*:*:*:*:*:x64:*", - "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20402:*:*:*:*:*:*:*" - ], "platforms": [ "32-bit Systems", "x64-based Systems", @@ -318,15 +423,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.1.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -336,15 +438,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25984:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.0.0", + "version": "6.1.7601.0", "lessThan": "6.1.7601.25984", "versionType": "custom", "status": "affected" @@ -354,15 +453,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -372,15 +468,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23736:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.2.0", + "version": "6.2.9200.0", "lessThan": "6.2.9200.23736", "versionType": "custom", "status": "affected" @@ -390,15 +483,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -408,15 +498,12 @@ { "vendor": "Microsoft", "product": "Windows Server 2012 R2 (Server Core installation)", - "cpes": [ - "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20402:*:*:*:*:*:x64:*" - ], "platforms": [ "x64-based Systems" ], "versions": [ { - "version": "6.3.0", + "version": "6.3.9600.0", "lessThan": "6.3.9600.20402", "versionType": "custom", "status": "affected" @@ -426,7 +513,7 @@ ], "descriptions": [ { - "value": "A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.\nPlease see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.\n", + "value": "A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.\nPlease see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.", "lang": "en-US" } ], @@ -444,20 +531,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-05-29T14:27:58.652Z" + "dateUpdated": "2025-01-02T18:58:30.402Z" }, "references": [ { + "name": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30190" - }, - { - "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "http://packetstormsecurity.com/files/167438/Microsoft-Office-Word-MSDTJS-Code-Execution.html" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190" } ], "metrics": [ @@ -511,7 +593,7 @@ "cveId": "CVE-2022-30190", "datePublished": "2022-06-01T20:10:17", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-08-03T06:40:47.824Z", + "dateUpdated": "2025-01-02T18:58:30.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30192.json b/cves/2022/30xxx/CVE-2022-30192.json index 4edfa68f5a56..eb5ac81de0d9 100644 --- a/cves/2022/30xxx/CVE-2022-30192.json +++ b/cves/2022/30xxx/CVE-2022-30192.json @@ -3,13 +3,28 @@ "cna": { "title": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "datePublic": "2022-06-23T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "103.0.1264.37" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Edge (Chromium-based)", - "cpes": [ - "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,22 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:31.486Z" + "dateUpdated": "2025-01-02T19:03:16.846Z" }, "references": [ { + "name": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30192" - }, - { - "name": "GLSA-202208-25", - "tags": [ - "vendor-advisory", - "x_refsource_GENTOO" + "vendor-advisory" ], - "url": "https://security.gentoo.org/glsa/202208-25" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30192" } ], "metrics": [ @@ -146,7 +154,7 @@ "cveId": "CVE-2022-30192", "datePublished": "2022-06-29T17:10:13", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-11-20T15:45:37.269Z", + "dateUpdated": "2025-01-02T19:03:16.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/30xxx/CVE-2022-30193.json b/cves/2022/30xxx/CVE-2022-30193.json index 0c414931204f..3008c9976a05 100644 --- a/cves/2022/30xxx/CVE-2022-30193.json +++ b/cves/2022/30xxx/CVE-2022-30193.json @@ -3,13 +3,28 @@ "cna": { "title": "AV1 Video Extension Remote Code Execution Vulnerability", "datePublic": "2022-06-14T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:av1_video_extension:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.1.0", + "versionEndExcluding": "1.1.51091.0" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "AV1 Video Extension", - "cpes": [ - "cpe:2.3:a:microsoft:av1_video_extension:1.1.51091.0:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,14 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:30.963Z" + "dateUpdated": "2025-01-02T19:03:16.316Z" }, "references": [ { + "name": "AV1 Video Extension Remote Code Execution Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30193" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30193" } ], "metrics": [ @@ -97,7 +113,7 @@ "cveId": "CVE-2022-30193", "datePublished": "2022-06-15T21:52:24", "dateReserved": "2022-05-03T00:00:00", - "dateUpdated": "2024-09-10T15:57:30.963Z", + "dateUpdated": "2025-01-02T19:03:16.316Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/33xxx/CVE-2022-33638.json b/cves/2022/33xxx/CVE-2022-33638.json index 45c3e9efc617..87fd7ec83d76 100644 --- a/cves/2022/33xxx/CVE-2022-33638.json +++ b/cves/2022/33xxx/CVE-2022-33638.json @@ -3,13 +3,28 @@ "cna": { "title": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "datePublic": "2022-06-23T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "103.0.1264.37" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Edge (Chromium-based)", - "cpes": [ - "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,22 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:32.024Z" + "dateUpdated": "2025-01-02T19:03:17.446Z" }, "references": [ { + "name": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" - ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33638" - }, - { - "name": "GLSA-202208-25", - "tags": [ - "vendor-advisory", - "x_refsource_GENTOO" + "vendor-advisory" ], - "url": "https://security.gentoo.org/glsa/202208-25" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33638" } ], "metrics": [ @@ -114,7 +122,7 @@ "cveId": "CVE-2022-33638", "datePublished": "2022-06-29T17:10:18", "dateReserved": "2022-06-14T00:00:00", - "dateUpdated": "2024-09-10T15:57:32.024Z", + "dateUpdated": "2025-01-02T19:03:17.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2022/33xxx/CVE-2022-33639.json b/cves/2022/33xxx/CVE-2022-33639.json index ca713fbd7234..4f4502223bf7 100644 --- a/cves/2022/33xxx/CVE-2022-33639.json +++ b/cves/2022/33xxx/CVE-2022-33639.json @@ -6,7 +6,7 @@ "cveId": "CVE-2022-33639", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:32.642Z", + "dateUpdated": "2025-01-02T19:03:18.161Z", "dateReserved": "2022-06-14T00:00:00", "datePublished": "2022-06-29T00:00:00" }, @@ -14,13 +14,28 @@ "cna": { "title": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "datePublic": "2022-06-24T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "103.0.1264.37" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Edge (Chromium-based)", - "cpes": [ - "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -54,18 +69,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:32.642Z" + "dateUpdated": "2025-01-02T19:03:18.161Z" }, "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33639" - }, - { - "name": "GLSA-202208-25", + "name": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "tags": [ "vendor-advisory" ], - "url": "https://security.gentoo.org/glsa/202208-25" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33639" } ], "metrics": [ diff --git a/cves/2022/33xxx/CVE-2022-33680.json b/cves/2022/33xxx/CVE-2022-33680.json index f7b85fdd55f4..f98a5119c142 100644 --- a/cves/2022/33xxx/CVE-2022-33680.json +++ b/cves/2022/33xxx/CVE-2022-33680.json @@ -3,13 +3,28 @@ "cna": { "title": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "datePublic": "2022-06-30T07:00:00+00:00", + "cpeApplicability": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "103.0.1264.44" + } + ] + } + ] + } + ], "affected": [ { "vendor": "Microsoft", "product": "Microsoft Edge (Chromium-based)", - "cpes": [ - "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" - ], "platforms": [ "Unknown" ], @@ -43,14 +58,15 @@ "providerMetadata": { "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft", - "dateUpdated": "2024-09-10T15:57:33.218Z" + "dateUpdated": "2025-01-02T19:03:18.707Z" }, "references": [ { + "name": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33680" + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33680" } ], "metrics": [ @@ -97,7 +113,7 @@ "cveId": "CVE-2022-33680", "datePublished": "2022-07-07T20:00:14", "dateReserved": "2022-06-14T00:00:00", - "dateUpdated": "2024-09-10T15:57:33.218Z", + "dateUpdated": "2025-01-02T19:03:18.707Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", diff --git a/cves/2023/35xxx/CVE-2023-35145.json b/cves/2023/35xxx/CVE-2023-35145.json index 750c54d33f52..8df547b921c0 100644 --- a/cves/2023/35xxx/CVE-2023-35145.json +++ b/cves/2023/35xxx/CVE-2023-35145.json @@ -8,7 +8,7 @@ "assignerShortName": "jenkins", "dateReserved": "2023-06-14T08:58:33.245Z", "datePublished": "2023-06-14T12:53:08.081Z", - "dateUpdated": "2024-08-02T16:23:59.354Z" + "dateUpdated": "2025-01-02T19:05:01.388Z" }, "containers": { "cna": { @@ -75,6 +75,66 @@ ] } ] + }, + { + "problemTypes": [ + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-79", + "lang": "en", + "description": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ], + "metrics": [ + { + "cvssV3_1": { + "scope": "CHANGED", + "version": "3.1", + "baseScore": 5.4, + "attackVector": "NETWORK", + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "integrityImpact": "LOW", + "userInteraction": "REQUIRED", + "attackComplexity": "LOW", + "availabilityImpact": "NONE", + "privilegesRequired": "LOW", + "confidentialityImpact": "LOW" + } + }, + { + "other": { + "type": "ssvc", + "content": { + "timestamp": "2025-01-02T19:01:49.596879Z", + "id": "CVE-2023-35145", + "options": [ + { + "Exploitation": "none" + }, + { + "Automatable": "no" + }, + { + "Technical Impact": "partial" + } + ], + "role": "CISA Coordinator", + "version": "2.0.3" + } + } + } + ], + "title": "CISA ADP Vulnrichment", + "providerMetadata": { + "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "shortName": "CISA-ADP", + "dateUpdated": "2025-01-02T19:05:01.388Z" + } } ] } diff --git a/cves/delta.json b/cves/delta.json index c2d9270ceaf5..3e70ff1af435 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,415 +1,619 @@ { - "fetchTime": "2025-01-02T18:58:08.024Z", - "numberOfChanges": 68, + "fetchTime": "2025-01-02T19:05:22.549Z", + "numberOfChanges": 102, "new": [], "updated": [ { - "cveId": "CVE-2022-21972", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-21972", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/21xxx/CVE-2022-21972.json", - "dateUpdated": "2025-01-02T18:57:45.597Z" + "cveId": "CVE-2022-21978", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-21978", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/21xxx/CVE-2022-21978.json", + "dateUpdated": "2025-01-02T18:58:25.947Z" }, { - "cveId": "CVE-2022-22011", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22011", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22011.json", - "dateUpdated": "2025-01-02T18:57:57.651Z" + "cveId": "CVE-2022-22018", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22018", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22018.json", + "dateUpdated": "2025-01-02T19:02:47.939Z" }, { - "cveId": "CVE-2022-22012", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22012", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22012.json", - "dateUpdated": "2025-01-02T18:57:58.262Z" + "cveId": "CVE-2022-22019", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22019", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22019.json", + "dateUpdated": "2025-01-02T18:58:21.892Z" }, { - "cveId": "CVE-2022-22013", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22013", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22013.json", - "dateUpdated": "2025-01-02T18:57:58.826Z" + "cveId": "CVE-2022-22021", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22021", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22021.json", + "dateUpdated": "2025-01-02T19:02:48.950Z" }, { - "cveId": "CVE-2022-22014", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22014", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22014.json", - "dateUpdated": "2025-01-02T18:57:59.437Z" + "cveId": "CVE-2022-23279", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-23279", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/23xxx/CVE-2022-23279.json", + "dateUpdated": "2025-01-02T18:58:24.832Z" }, { - "cveId": "CVE-2022-22015", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22015", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22015.json", - "dateUpdated": "2025-01-02T18:58:00.432Z" + "cveId": "CVE-2022-26905", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26905", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26905.json", + "dateUpdated": "2025-01-02T18:58:24.232Z" }, { - "cveId": "CVE-2022-22016", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22016", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22016.json", - "dateUpdated": "2025-01-02T18:58:00.991Z" + "cveId": "CVE-2022-26923", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26923", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26923.json", + "dateUpdated": "2025-01-02T18:58:25.436Z" }, { - "cveId": "CVE-2022-22017", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22017", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22017.json", - "dateUpdated": "2025-01-02T18:58:01.548Z" + "cveId": "CVE-2022-29107", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29107", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29107.json", + "dateUpdated": "2025-01-02T18:58:05.145Z" }, { - "cveId": "CVE-2022-22713", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22713", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22713.json", - "dateUpdated": "2025-01-02T18:57:47.505Z" + "cveId": "CVE-2022-29108", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29108", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29108.json", + "dateUpdated": "2025-01-02T18:58:05.719Z" }, { - "cveId": "CVE-2022-23267", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-23267", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/23xxx/CVE-2022-23267.json", - "dateUpdated": "2025-01-02T18:57:48.914Z" + "cveId": "CVE-2022-29109", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29109", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29109.json", + "dateUpdated": "2025-01-02T18:58:06.242Z" }, { - "cveId": "CVE-2022-23270", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-23270", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/23xxx/CVE-2022-23270.json", - "dateUpdated": "2025-01-02T18:57:46.267Z" + "cveId": "CVE-2022-29110", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29110", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29110.json", + "dateUpdated": "2025-01-02T18:58:06.878Z" }, { - "cveId": "CVE-2022-24466", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-24466", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/24xxx/CVE-2022-24466.json", - "dateUpdated": "2025-01-02T18:57:46.879Z" + "cveId": "CVE-2022-29111", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29111", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29111.json", + "dateUpdated": "2025-01-02T19:02:49.699Z" }, { - "cveId": "CVE-2022-24532", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-24532", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/24xxx/CVE-2022-24532.json", - "dateUpdated": "2025-01-02T18:52:15.208Z" + "cveId": "CVE-2022-29112", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29112", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29112.json", + "dateUpdated": "2025-01-02T18:58:07.485Z" }, { - "cveId": "CVE-2022-24543", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-24543", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/24xxx/CVE-2022-24543.json", - "dateUpdated": "2025-01-02T18:52:14.580Z" + "cveId": "CVE-2022-29113", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29113", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29113.json", + "dateUpdated": "2025-01-02T18:58:08.121Z" }, { - "cveId": "CVE-2022-26807", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26807", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26807.json", - "dateUpdated": "2025-01-02T18:51:58.688Z" + "cveId": "CVE-2022-29114", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29114", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29114.json", + "dateUpdated": "2025-01-02T18:58:08.738Z" }, { - "cveId": "CVE-2022-26808", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26808", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26808.json", - "dateUpdated": "2025-01-02T18:51:59.211Z" + "cveId": "CVE-2022-29115", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29115", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29115.json", + "dateUpdated": "2025-01-02T18:58:09.358Z" }, { - "cveId": "CVE-2022-26809", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26809", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26809.json", - "dateUpdated": "2025-01-02T18:51:59.836Z" + "cveId": "CVE-2022-29116", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29116", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29116.json", + "dateUpdated": "2025-01-02T18:58:26.467Z" }, { - "cveId": "CVE-2022-26810", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26810", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26810.json", - "dateUpdated": "2025-01-02T18:52:00.614Z" + "cveId": "CVE-2022-29117", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29117", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29117.json", + "dateUpdated": "2025-01-02T18:58:09.910Z" }, { - "cveId": "CVE-2022-26814", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26814", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26814.json", - "dateUpdated": "2025-01-02T18:52:01.326Z" + "cveId": "CVE-2022-29119", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29119", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29119.json", + "dateUpdated": "2025-01-02T19:02:47.240Z" }, { - "cveId": "CVE-2022-26815", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26815", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26815.json", - "dateUpdated": "2025-01-02T18:52:02.862Z" + "cveId": "CVE-2022-29120", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29120", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29120.json", + "dateUpdated": "2025-01-02T18:58:26.916Z" }, { - "cveId": "CVE-2022-26816", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26816", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26816.json", - "dateUpdated": "2025-01-02T18:52:03.620Z" + "cveId": "CVE-2022-29121", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29121", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29121.json", + "dateUpdated": "2025-01-02T18:58:27.509Z" }, { - "cveId": "CVE-2022-26817", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26817", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26817.json", - "dateUpdated": "2025-01-02T18:52:04.188Z" + "cveId": "CVE-2022-29122", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29122", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29122.json", + "dateUpdated": "2025-01-02T18:58:28.143Z" }, { - "cveId": "CVE-2022-26818", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26818", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26818.json", - "dateUpdated": "2025-01-02T18:52:04.774Z" + "cveId": "CVE-2022-29123", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29123", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29123.json", + "dateUpdated": "2025-01-02T18:58:28.703Z" }, { - "cveId": "CVE-2022-26819", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26819", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26819.json", - "dateUpdated": "2025-01-02T18:52:05.353Z" + "cveId": "CVE-2022-29125", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29125", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29125.json", + "dateUpdated": "2025-01-02T18:58:10.468Z" }, { - "cveId": "CVE-2022-26820", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26820", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26820.json", - "dateUpdated": "2025-01-02T18:52:05.994Z" + "cveId": "CVE-2022-29126", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29126", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29126.json", + "dateUpdated": "2025-01-02T18:58:11.048Z" }, { - "cveId": "CVE-2022-26821", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26821", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26821.json", - "dateUpdated": "2025-01-02T18:52:06.631Z" + "cveId": "CVE-2022-29127", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29127", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29127.json", + "dateUpdated": "2025-01-02T18:58:11.592Z" }, { - "cveId": "CVE-2022-26822", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26822", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26822.json", - "dateUpdated": "2025-01-02T18:52:07.252Z" + "cveId": "CVE-2022-29128", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29128", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29128.json", + "dateUpdated": "2025-01-02T18:58:12.267Z" }, { - "cveId": "CVE-2022-26823", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26823", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26823.json", - "dateUpdated": "2025-01-02T18:52:07.813Z" + "cveId": "CVE-2022-29129", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29129", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29129.json", + "dateUpdated": "2025-01-02T18:58:12.849Z" }, { - "cveId": "CVE-2022-26824", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26824", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26824.json", - "dateUpdated": "2025-01-02T18:52:08.425Z" + "cveId": "CVE-2022-29130", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29130", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29130.json", + "dateUpdated": "2025-01-02T18:58:13.479Z" }, { - "cveId": "CVE-2022-26825", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26825", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26825.json", - "dateUpdated": "2025-01-02T18:52:08.979Z" + "cveId": "CVE-2022-29131", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29131", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29131.json", + "dateUpdated": "2025-01-02T18:58:14.095Z" }, { - "cveId": "CVE-2022-26826", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26826", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26826.json", - "dateUpdated": "2025-01-02T18:52:09.569Z" + "cveId": "CVE-2022-29132", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29132", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29132.json", + "dateUpdated": "2025-01-02T18:58:14.674Z" }, { - "cveId": "CVE-2022-26827", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26827", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26827.json", - "dateUpdated": "2025-01-02T18:52:10.261Z" + "cveId": "CVE-2022-29133", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29133", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29133.json", + "dateUpdated": "2025-01-02T18:58:15.280Z" }, { - "cveId": "CVE-2022-26828", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26828", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26828.json", - "dateUpdated": "2025-01-02T18:52:11.171Z" + "cveId": "CVE-2022-29134", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29134", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29134.json", + "dateUpdated": "2025-01-02T18:58:15.760Z" }, { - "cveId": "CVE-2022-26829", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26829", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26829.json", - "dateUpdated": "2025-01-02T18:52:12.065Z" + "cveId": "CVE-2022-29135", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29135", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29135.json", + "dateUpdated": "2025-01-02T18:58:16.317Z" }, { - "cveId": "CVE-2022-26830", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26830", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26830.json", - "dateUpdated": "2025-01-02T18:52:12.697Z" + "cveId": "CVE-2022-29137", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29137", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29137.json", + "dateUpdated": "2025-01-02T18:58:16.956Z" }, { - "cveId": "CVE-2022-26831", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26831", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26831.json", - "dateUpdated": "2025-01-02T18:52:13.404Z" + "cveId": "CVE-2022-29138", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29138", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29138.json", + "dateUpdated": "2025-01-02T18:58:17.481Z" }, { - "cveId": "CVE-2022-26832", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26832", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26832.json", - "dateUpdated": "2025-01-02T18:52:13.987Z" + "cveId": "CVE-2022-29139", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29139", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29139.json", + "dateUpdated": "2025-01-02T18:58:17.940Z" }, { - "cveId": "CVE-2022-26900", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26900", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26900.json", - "dateUpdated": "2025-01-02T18:52:16.879Z" + "cveId": "CVE-2022-29140", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29140", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29140.json", + "dateUpdated": "2025-01-02T18:58:18.409Z" }, { - "cveId": "CVE-2022-26903", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26903", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26903.json", - "dateUpdated": "2025-01-02T18:52:15.805Z" + "cveId": "CVE-2022-29141", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29141", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29141.json", + "dateUpdated": "2025-01-02T18:58:18.926Z" }, { - "cveId": "CVE-2022-26907", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26907", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26907.json", - "dateUpdated": "2025-01-02T18:52:16.339Z" + "cveId": "CVE-2022-29142", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29142", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29142.json", + "dateUpdated": "2025-01-02T18:58:19.437Z" }, { - "cveId": "CVE-2022-26908", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26908", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26908.json", - "dateUpdated": "2025-01-02T18:52:17.434Z" + "cveId": "CVE-2022-29143", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29143", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29143.json", + "dateUpdated": "2025-01-02T19:03:12.592Z" }, { - "cveId": "CVE-2022-26909", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26909", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26909.json", - "dateUpdated": "2025-01-02T18:52:18.135Z" + "cveId": "CVE-2022-29145", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29145", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29145.json", + "dateUpdated": "2025-01-02T18:58:19.924Z" }, { - "cveId": "CVE-2022-26910", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26910", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26910.json", - "dateUpdated": "2025-01-02T18:52:18.646Z" + "cveId": "CVE-2022-29148", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29148", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29148.json", + "dateUpdated": "2025-01-02T18:58:20.375Z" }, { - "cveId": "CVE-2022-26911", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26911", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26911.json", - "dateUpdated": "2025-01-02T18:52:19.258Z" + "cveId": "CVE-2022-29149", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29149", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29149.json", + "dateUpdated": "2025-01-02T19:03:13.161Z" }, { - "cveId": "CVE-2022-26912", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26912", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26912.json", - "dateUpdated": "2025-01-02T18:52:19.873Z" + "cveId": "CVE-2022-29150", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29150", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29150.json", + "dateUpdated": "2025-01-02T18:58:20.892Z" }, { - "cveId": "CVE-2022-26913", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26913", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26913.json", - "dateUpdated": "2025-01-02T18:57:48.191Z" + "cveId": "CVE-2022-29151", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29151", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29151.json", + "dateUpdated": "2025-01-02T18:58:21.426Z" }, { - "cveId": "CVE-2022-26921", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26921", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26921.json", - "dateUpdated": "2025-01-02T18:52:20.342Z" + "cveId": "CVE-2022-30127", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30127", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30127.json", + "dateUpdated": "2025-01-02T18:58:23.678Z" }, { - "cveId": "CVE-2022-26924", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26924", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26924.json", - "dateUpdated": "2025-01-02T18:52:20.851Z" + "cveId": "CVE-2022-30128", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30128", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30128.json", + "dateUpdated": "2025-01-02T18:58:23.115Z" }, { - "cveId": "CVE-2022-26925", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26925", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26925.json", - "dateUpdated": "2025-01-02T18:57:49.491Z" + "cveId": "CVE-2022-30129", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30129", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30129.json", + "dateUpdated": "2025-01-02T18:58:29.243Z" }, { - "cveId": "CVE-2022-26926", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26926", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26926.json", - "dateUpdated": "2025-01-02T18:57:50.074Z" + "cveId": "CVE-2022-30130", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30130", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30130.json", + "dateUpdated": "2025-01-02T18:58:22.482Z" }, { - "cveId": "CVE-2022-26927", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26927", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26927.json", - "dateUpdated": "2025-01-02T18:57:50.666Z" + "cveId": "CVE-2022-30131", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30131", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30131.json", + "dateUpdated": "2025-01-02T19:02:50.392Z" }, { - "cveId": "CVE-2022-26930", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26930", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26930.json", - "dateUpdated": "2025-01-02T18:57:51.281Z" + "cveId": "CVE-2022-30132", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30132", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30132.json", + "dateUpdated": "2025-01-02T19:02:51.096Z" }, { - "cveId": "CVE-2022-26931", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26931", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26931.json", - "dateUpdated": "2025-01-02T18:57:51.839Z" + "cveId": "CVE-2022-30135", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30135", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30135.json", + "dateUpdated": "2025-01-02T19:02:51.702Z" }, { - "cveId": "CVE-2022-26932", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26932", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26932.json", - "dateUpdated": "2025-01-02T18:57:52.373Z" + "cveId": "CVE-2022-30136", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30136", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30136.json", + "dateUpdated": "2025-01-02T19:02:52.437Z" }, { - "cveId": "CVE-2022-26933", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26933", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26933.json", - "dateUpdated": "2025-01-02T18:57:52.918Z" + "cveId": "CVE-2022-30137", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30137", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30137.json", + "dateUpdated": "2025-01-02T19:02:52.975Z" }, { - "cveId": "CVE-2022-26934", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26934", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26934.json", - "dateUpdated": "2025-01-02T18:57:53.529Z" + "cveId": "CVE-2022-30138", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30138", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30138.json", + "dateUpdated": "2025-01-02T18:58:29.785Z" }, { - "cveId": "CVE-2022-26935", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26935", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26935.json", - "dateUpdated": "2025-01-02T18:57:54.106Z" + "cveId": "CVE-2022-30139", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30139", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30139.json", + "dateUpdated": "2025-01-02T19:03:13.604Z" }, { - "cveId": "CVE-2022-26936", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26936", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26936.json", - "dateUpdated": "2025-01-02T18:57:54.588Z" + "cveId": "CVE-2022-30140", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30140", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30140.json", + "dateUpdated": "2025-01-02T19:02:53.692Z" }, { - "cveId": "CVE-2022-26937", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26937", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26937.json", - "dateUpdated": "2025-01-02T18:57:55.251Z" + "cveId": "CVE-2022-30141", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30141", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30141.json", + "dateUpdated": "2025-01-02T19:02:54.273Z" }, { - "cveId": "CVE-2022-26938", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26938", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26938.json", - "dateUpdated": "2025-01-02T18:57:55.943Z" + "cveId": "CVE-2022-30142", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30142", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30142.json", + "dateUpdated": "2025-01-02T19:02:54.865Z" }, { - "cveId": "CVE-2022-26939", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26939", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26939.json", - "dateUpdated": "2025-01-02T18:57:56.468Z" + "cveId": "CVE-2022-30143", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30143", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30143.json", + "dateUpdated": "2025-01-02T19:02:55.334Z" }, { - "cveId": "CVE-2022-26940", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26940", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26940.json", - "dateUpdated": "2025-01-02T18:57:57.069Z" + "cveId": "CVE-2022-30145", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30145", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30145.json", + "dateUpdated": "2025-01-02T19:02:55.780Z" }, { - "cveId": "CVE-2022-29102", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29102", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29102.json", - "dateUpdated": "2025-01-02T18:58:02.146Z" + "cveId": "CVE-2022-30146", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30146", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30146.json", + "dateUpdated": "2025-01-02T19:03:14.068Z" }, { - "cveId": "CVE-2022-29103", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29103", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29103.json", - "dateUpdated": "2025-01-02T18:58:02.760Z" + "cveId": "CVE-2022-30147", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30147", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30147.json", + "dateUpdated": "2025-01-02T19:03:14.568Z" }, { - "cveId": "CVE-2022-29104", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29104", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29104.json", - "dateUpdated": "2025-01-02T18:58:03.491Z" + "cveId": "CVE-2022-30148", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30148", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30148.json", + "dateUpdated": "2025-01-02T19:02:56.425Z" }, { - "cveId": "CVE-2022-29105", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29105", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29105.json", - "dateUpdated": "2025-01-02T18:58:04.062Z" + "cveId": "CVE-2022-30149", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30149", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30149.json", + "dateUpdated": "2025-01-02T19:02:56.969Z" }, { - "cveId": "CVE-2022-29106", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29106", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29106.json", - "dateUpdated": "2025-01-02T18:58:04.606Z" + "cveId": "CVE-2022-30150", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30150", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30150.json", + "dateUpdated": "2025-01-02T19:02:57.437Z" }, { - "cveId": "CVE-2022-29144", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29144", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29144.json", - "dateUpdated": "2025-01-02T18:52:21.465Z" + "cveId": "CVE-2022-30151", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30151", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30151.json", + "dateUpdated": "2025-01-02T19:02:58.003Z" + }, + { + "cveId": "CVE-2022-30152", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30152", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30152.json", + "dateUpdated": "2025-01-02T19:02:58.633Z" + }, + { + "cveId": "CVE-2022-30153", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30153", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30153.json", + "dateUpdated": "2025-01-02T19:02:59.220Z" + }, + { + "cveId": "CVE-2022-30154", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30154", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30154.json", + "dateUpdated": "2025-01-02T19:02:59.809Z" + }, + { + "cveId": "CVE-2022-30155", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30155", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30155.json", + "dateUpdated": "2025-01-02T19:03:00.462Z" + }, + { + "cveId": "CVE-2022-30157", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30157", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30157.json", + "dateUpdated": "2025-01-02T19:03:01.074Z" + }, + { + "cveId": "CVE-2022-30158", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30158", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30158.json", + "dateUpdated": "2025-01-02T19:03:01.749Z" + }, + { + "cveId": "CVE-2022-30159", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30159", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30159.json", + "dateUpdated": "2025-01-02T19:03:02.371Z" + }, + { + "cveId": "CVE-2022-30160", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30160", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30160.json", + "dateUpdated": "2025-01-02T19:03:02.865Z" + }, + { + "cveId": "CVE-2022-30161", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30161", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30161.json", + "dateUpdated": "2025-01-02T19:03:03.409Z" + }, + { + "cveId": "CVE-2022-30162", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30162", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30162.json", + "dateUpdated": "2025-01-02T19:03:03.945Z" + }, + { + "cveId": "CVE-2022-30163", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30163", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30163.json", + "dateUpdated": "2025-01-02T19:03:04.419Z" + }, + { + "cveId": "CVE-2022-30164", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30164", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30164.json", + "dateUpdated": "2025-01-02T19:03:05.004Z" + }, + { + "cveId": "CVE-2022-30165", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30165", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30165.json", + "dateUpdated": "2025-01-02T19:03:05.918Z" + }, + { + "cveId": "CVE-2022-30166", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30166", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30166.json", + "dateUpdated": "2025-01-02T19:03:15.232Z" + }, + { + "cveId": "CVE-2022-30167", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30167", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30167.json", + "dateUpdated": "2025-01-02T19:03:05.459Z" + }, + { + "cveId": "CVE-2022-30168", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30168", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30168.json", + "dateUpdated": "2025-01-02T19:03:15.855Z" + }, + { + "cveId": "CVE-2022-30171", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30171", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30171.json", + "dateUpdated": "2025-01-02T19:03:06.479Z" + }, + { + "cveId": "CVE-2022-30172", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30172", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30172.json", + "dateUpdated": "2025-01-02T19:03:07.082Z" + }, + { + "cveId": "CVE-2022-30173", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30173", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30173.json", + "dateUpdated": "2025-01-02T19:03:07.533Z" + }, + { + "cveId": "CVE-2022-30174", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30174", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30174.json", + "dateUpdated": "2025-01-02T19:03:08.271Z" + }, + { + "cveId": "CVE-2022-30177", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30177", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30177.json", + "dateUpdated": "2025-01-02T19:03:08.895Z" + }, + { + "cveId": "CVE-2022-30178", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30178", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30178.json", + "dateUpdated": "2025-01-02T19:03:09.487Z" + }, + { + "cveId": "CVE-2022-30179", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30179", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30179.json", + "dateUpdated": "2025-01-02T19:03:10.001Z" + }, + { + "cveId": "CVE-2022-30180", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30180", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30180.json", + "dateUpdated": "2025-01-02T19:03:10.512Z" + }, + { + "cveId": "CVE-2022-30184", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30184", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30184.json", + "dateUpdated": "2025-01-02T19:03:10.967Z" + }, + { + "cveId": "CVE-2022-30188", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30188", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30188.json", + "dateUpdated": "2025-01-02T19:03:11.571Z" + }, + { + "cveId": "CVE-2022-30189", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30189", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30189.json", + "dateUpdated": "2025-01-02T19:03:12.155Z" + }, + { + "cveId": "CVE-2022-30190", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30190", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30190.json", + "dateUpdated": "2025-01-02T18:58:30.402Z" + }, + { + "cveId": "CVE-2022-30192", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30192", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30192.json", + "dateUpdated": "2025-01-02T19:03:16.846Z" + }, + { + "cveId": "CVE-2022-30193", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30193", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30193.json", + "dateUpdated": "2025-01-02T19:03:16.316Z" + }, + { + "cveId": "CVE-2022-33638", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-33638", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/33xxx/CVE-2022-33638.json", + "dateUpdated": "2025-01-02T19:03:17.446Z" + }, + { + "cveId": "CVE-2022-33639", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-33639", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/33xxx/CVE-2022-33639.json", + "dateUpdated": "2025-01-02T19:03:18.161Z" + }, + { + "cveId": "CVE-2022-33680", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-33680", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/33xxx/CVE-2022-33680.json", + "dateUpdated": "2025-01-02T19:03:18.707Z" + }, + { + "cveId": "CVE-2023-35145", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-35145", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/35xxx/CVE-2023-35145.json", + "dateUpdated": "2025-01-02T19:05:01.388Z" } ], "error": [] diff --git a/cves/deltaLog.json b/cves/deltaLog.json index ff9ecf65b626..52a61f230f1e 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,624 @@ [ + { + "fetchTime": "2025-01-02T19:05:22.549Z", + "numberOfChanges": 102, + "new": [], + "updated": [ + { + "cveId": "CVE-2022-21978", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-21978", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/21xxx/CVE-2022-21978.json", + "dateUpdated": "2025-01-02T18:58:25.947Z" + }, + { + "cveId": "CVE-2022-22018", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22018", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22018.json", + "dateUpdated": "2025-01-02T19:02:47.939Z" + }, + { + "cveId": "CVE-2022-22019", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22019", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22019.json", + "dateUpdated": "2025-01-02T18:58:21.892Z" + }, + { + "cveId": "CVE-2022-22021", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-22021", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/22xxx/CVE-2022-22021.json", + "dateUpdated": "2025-01-02T19:02:48.950Z" + }, + { + "cveId": "CVE-2022-23279", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-23279", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/23xxx/CVE-2022-23279.json", + "dateUpdated": "2025-01-02T18:58:24.832Z" + }, + { + "cveId": "CVE-2022-26905", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26905", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26905.json", + "dateUpdated": "2025-01-02T18:58:24.232Z" + }, + { + "cveId": "CVE-2022-26923", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26923", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26923.json", + "dateUpdated": "2025-01-02T18:58:25.436Z" + }, + { + "cveId": "CVE-2022-29107", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29107", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29107.json", + "dateUpdated": "2025-01-02T18:58:05.145Z" + }, + { + "cveId": "CVE-2022-29108", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29108", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29108.json", + "dateUpdated": "2025-01-02T18:58:05.719Z" + }, + { + "cveId": "CVE-2022-29109", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29109", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29109.json", + "dateUpdated": "2025-01-02T18:58:06.242Z" + }, + { + "cveId": "CVE-2022-29110", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29110", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29110.json", + "dateUpdated": "2025-01-02T18:58:06.878Z" + }, + { + "cveId": "CVE-2022-29111", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29111", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29111.json", + "dateUpdated": "2025-01-02T19:02:49.699Z" + }, + { + "cveId": "CVE-2022-29112", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29112", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29112.json", + "dateUpdated": "2025-01-02T18:58:07.485Z" + }, + { + "cveId": "CVE-2022-29113", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29113", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29113.json", + "dateUpdated": "2025-01-02T18:58:08.121Z" + }, + { + "cveId": "CVE-2022-29114", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29114", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29114.json", + "dateUpdated": "2025-01-02T18:58:08.738Z" + }, + { + "cveId": "CVE-2022-29115", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29115", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29115.json", + "dateUpdated": "2025-01-02T18:58:09.358Z" + }, + { + "cveId": "CVE-2022-29116", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29116", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29116.json", + "dateUpdated": "2025-01-02T18:58:26.467Z" + }, + { + "cveId": "CVE-2022-29117", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29117", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29117.json", + "dateUpdated": "2025-01-02T18:58:09.910Z" + }, + { + "cveId": "CVE-2022-29119", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29119", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29119.json", + "dateUpdated": "2025-01-02T19:02:47.240Z" + }, + { + "cveId": "CVE-2022-29120", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29120", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29120.json", + "dateUpdated": "2025-01-02T18:58:26.916Z" + }, + { + "cveId": "CVE-2022-29121", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29121", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29121.json", + "dateUpdated": "2025-01-02T18:58:27.509Z" + }, + { + "cveId": "CVE-2022-29122", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29122", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29122.json", + "dateUpdated": "2025-01-02T18:58:28.143Z" + }, + { + "cveId": "CVE-2022-29123", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29123", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29123.json", + "dateUpdated": "2025-01-02T18:58:28.703Z" + }, + { + "cveId": "CVE-2022-29125", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29125", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29125.json", + "dateUpdated": "2025-01-02T18:58:10.468Z" + }, + { + "cveId": "CVE-2022-29126", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29126", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29126.json", + "dateUpdated": "2025-01-02T18:58:11.048Z" + }, + { + "cveId": "CVE-2022-29127", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29127", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29127.json", + "dateUpdated": "2025-01-02T18:58:11.592Z" + }, + { + "cveId": "CVE-2022-29128", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29128", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29128.json", + "dateUpdated": "2025-01-02T18:58:12.267Z" + }, + { + "cveId": "CVE-2022-29129", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29129", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29129.json", + "dateUpdated": "2025-01-02T18:58:12.849Z" + }, + { + "cveId": "CVE-2022-29130", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29130", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29130.json", + "dateUpdated": "2025-01-02T18:58:13.479Z" + }, + { + "cveId": "CVE-2022-29131", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29131", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29131.json", + "dateUpdated": "2025-01-02T18:58:14.095Z" + }, + { + "cveId": "CVE-2022-29132", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29132", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29132.json", + "dateUpdated": "2025-01-02T18:58:14.674Z" + }, + { + "cveId": "CVE-2022-29133", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29133", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29133.json", + "dateUpdated": "2025-01-02T18:58:15.280Z" + }, + { + "cveId": "CVE-2022-29134", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29134", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29134.json", + "dateUpdated": "2025-01-02T18:58:15.760Z" + }, + { + "cveId": "CVE-2022-29135", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29135", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29135.json", + "dateUpdated": "2025-01-02T18:58:16.317Z" + }, + { + "cveId": "CVE-2022-29137", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29137", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29137.json", + "dateUpdated": "2025-01-02T18:58:16.956Z" + }, + { + "cveId": "CVE-2022-29138", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29138", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29138.json", + "dateUpdated": "2025-01-02T18:58:17.481Z" + }, + { + "cveId": "CVE-2022-29139", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29139", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29139.json", + "dateUpdated": "2025-01-02T18:58:17.940Z" + }, + { + "cveId": "CVE-2022-29140", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29140", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29140.json", + "dateUpdated": "2025-01-02T18:58:18.409Z" + }, + { + "cveId": "CVE-2022-29141", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29141", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29141.json", + "dateUpdated": "2025-01-02T18:58:18.926Z" + }, + { + "cveId": "CVE-2022-29142", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29142", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29142.json", + "dateUpdated": "2025-01-02T18:58:19.437Z" + }, + { + "cveId": "CVE-2022-29143", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29143", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29143.json", + "dateUpdated": "2025-01-02T19:03:12.592Z" + }, + { + "cveId": "CVE-2022-29145", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29145", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29145.json", + "dateUpdated": "2025-01-02T18:58:19.924Z" + }, + { + "cveId": "CVE-2022-29148", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29148", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29148.json", + "dateUpdated": "2025-01-02T18:58:20.375Z" + }, + { + "cveId": "CVE-2022-29149", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29149", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29149.json", + "dateUpdated": "2025-01-02T19:03:13.161Z" + }, + { + "cveId": "CVE-2022-29150", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29150", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29150.json", + "dateUpdated": "2025-01-02T18:58:20.892Z" + }, + { + "cveId": "CVE-2022-29151", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-29151", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/29xxx/CVE-2022-29151.json", + "dateUpdated": "2025-01-02T18:58:21.426Z" + }, + { + "cveId": "CVE-2022-30127", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30127", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30127.json", + "dateUpdated": "2025-01-02T18:58:23.678Z" + }, + { + "cveId": "CVE-2022-30128", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30128", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30128.json", + "dateUpdated": "2025-01-02T18:58:23.115Z" + }, + { + "cveId": "CVE-2022-30129", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30129", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30129.json", + "dateUpdated": "2025-01-02T18:58:29.243Z" + }, + { + "cveId": "CVE-2022-30130", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30130", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30130.json", + "dateUpdated": "2025-01-02T18:58:22.482Z" + }, + { + "cveId": "CVE-2022-30131", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30131", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30131.json", + "dateUpdated": "2025-01-02T19:02:50.392Z" + }, + { + "cveId": "CVE-2022-30132", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30132", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30132.json", + "dateUpdated": "2025-01-02T19:02:51.096Z" + }, + { + "cveId": "CVE-2022-30135", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30135", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30135.json", + "dateUpdated": "2025-01-02T19:02:51.702Z" + }, + { + "cveId": "CVE-2022-30136", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30136", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30136.json", + "dateUpdated": "2025-01-02T19:02:52.437Z" + }, + { + "cveId": "CVE-2022-30137", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30137", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30137.json", + "dateUpdated": "2025-01-02T19:02:52.975Z" + }, + { + "cveId": "CVE-2022-30138", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30138", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30138.json", + "dateUpdated": "2025-01-02T18:58:29.785Z" + }, + { + "cveId": "CVE-2022-30139", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30139", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30139.json", + "dateUpdated": "2025-01-02T19:03:13.604Z" + }, + { + "cveId": "CVE-2022-30140", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30140", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30140.json", + "dateUpdated": "2025-01-02T19:02:53.692Z" + }, + { + "cveId": "CVE-2022-30141", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30141", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30141.json", + "dateUpdated": "2025-01-02T19:02:54.273Z" + }, + { + "cveId": "CVE-2022-30142", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30142", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30142.json", + "dateUpdated": "2025-01-02T19:02:54.865Z" + }, + { + "cveId": "CVE-2022-30143", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30143", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30143.json", + "dateUpdated": "2025-01-02T19:02:55.334Z" + }, + { + "cveId": "CVE-2022-30145", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30145", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30145.json", + "dateUpdated": "2025-01-02T19:02:55.780Z" + }, + { + "cveId": "CVE-2022-30146", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30146", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30146.json", + "dateUpdated": "2025-01-02T19:03:14.068Z" + }, + { + "cveId": "CVE-2022-30147", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30147", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30147.json", + "dateUpdated": "2025-01-02T19:03:14.568Z" + }, + { + "cveId": "CVE-2022-30148", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30148", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30148.json", + "dateUpdated": "2025-01-02T19:02:56.425Z" + }, + { + "cveId": "CVE-2022-30149", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30149", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30149.json", + "dateUpdated": "2025-01-02T19:02:56.969Z" + }, + { + "cveId": "CVE-2022-30150", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30150", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30150.json", + "dateUpdated": "2025-01-02T19:02:57.437Z" + }, + { + "cveId": "CVE-2022-30151", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30151", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30151.json", + "dateUpdated": "2025-01-02T19:02:58.003Z" + }, + { + "cveId": "CVE-2022-30152", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30152", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30152.json", + "dateUpdated": "2025-01-02T19:02:58.633Z" + }, + { + "cveId": "CVE-2022-30153", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30153", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30153.json", + "dateUpdated": "2025-01-02T19:02:59.220Z" + }, + { + "cveId": "CVE-2022-30154", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30154", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30154.json", + "dateUpdated": "2025-01-02T19:02:59.809Z" + }, + { + "cveId": "CVE-2022-30155", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30155", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30155.json", + "dateUpdated": "2025-01-02T19:03:00.462Z" + }, + { + "cveId": "CVE-2022-30157", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30157", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30157.json", + "dateUpdated": "2025-01-02T19:03:01.074Z" + }, + { + "cveId": "CVE-2022-30158", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30158", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30158.json", + "dateUpdated": "2025-01-02T19:03:01.749Z" + }, + { + "cveId": "CVE-2022-30159", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30159", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30159.json", + "dateUpdated": "2025-01-02T19:03:02.371Z" + }, + { + "cveId": "CVE-2022-30160", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30160", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30160.json", + "dateUpdated": "2025-01-02T19:03:02.865Z" + }, + { + "cveId": "CVE-2022-30161", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30161", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30161.json", + "dateUpdated": "2025-01-02T19:03:03.409Z" + }, + { + "cveId": "CVE-2022-30162", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30162", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30162.json", + "dateUpdated": "2025-01-02T19:03:03.945Z" + }, + { + "cveId": "CVE-2022-30163", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30163", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30163.json", + "dateUpdated": "2025-01-02T19:03:04.419Z" + }, + { + "cveId": "CVE-2022-30164", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30164", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30164.json", + "dateUpdated": "2025-01-02T19:03:05.004Z" + }, + { + "cveId": "CVE-2022-30165", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30165", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30165.json", + "dateUpdated": "2025-01-02T19:03:05.918Z" + }, + { + "cveId": "CVE-2022-30166", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30166", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30166.json", + "dateUpdated": "2025-01-02T19:03:15.232Z" + }, + { + "cveId": "CVE-2022-30167", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30167", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30167.json", + "dateUpdated": "2025-01-02T19:03:05.459Z" + }, + { + "cveId": "CVE-2022-30168", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30168", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30168.json", + "dateUpdated": "2025-01-02T19:03:15.855Z" + }, + { + "cveId": "CVE-2022-30171", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30171", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30171.json", + "dateUpdated": "2025-01-02T19:03:06.479Z" + }, + { + "cveId": "CVE-2022-30172", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30172", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30172.json", + "dateUpdated": "2025-01-02T19:03:07.082Z" + }, + { + "cveId": "CVE-2022-30173", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30173", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30173.json", + "dateUpdated": "2025-01-02T19:03:07.533Z" + }, + { + "cveId": "CVE-2022-30174", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30174", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30174.json", + "dateUpdated": "2025-01-02T19:03:08.271Z" + }, + { + "cveId": "CVE-2022-30177", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30177", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30177.json", + "dateUpdated": "2025-01-02T19:03:08.895Z" + }, + { + "cveId": "CVE-2022-30178", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30178", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30178.json", + "dateUpdated": "2025-01-02T19:03:09.487Z" + }, + { + "cveId": "CVE-2022-30179", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30179", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30179.json", + "dateUpdated": "2025-01-02T19:03:10.001Z" + }, + { + "cveId": "CVE-2022-30180", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30180", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30180.json", + "dateUpdated": "2025-01-02T19:03:10.512Z" + }, + { + "cveId": "CVE-2022-30184", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30184", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30184.json", + "dateUpdated": "2025-01-02T19:03:10.967Z" + }, + { + "cveId": "CVE-2022-30188", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30188", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30188.json", + "dateUpdated": "2025-01-02T19:03:11.571Z" + }, + { + "cveId": "CVE-2022-30189", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30189", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30189.json", + "dateUpdated": "2025-01-02T19:03:12.155Z" + }, + { + "cveId": "CVE-2022-30190", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30190", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30190.json", + "dateUpdated": "2025-01-02T18:58:30.402Z" + }, + { + "cveId": "CVE-2022-30192", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30192", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30192.json", + "dateUpdated": "2025-01-02T19:03:16.846Z" + }, + { + "cveId": "CVE-2022-30193", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30193", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30193.json", + "dateUpdated": "2025-01-02T19:03:16.316Z" + }, + { + "cveId": "CVE-2022-33638", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-33638", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/33xxx/CVE-2022-33638.json", + "dateUpdated": "2025-01-02T19:03:17.446Z" + }, + { + "cveId": "CVE-2022-33639", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-33639", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/33xxx/CVE-2022-33639.json", + "dateUpdated": "2025-01-02T19:03:18.161Z" + }, + { + "cveId": "CVE-2022-33680", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-33680", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/33xxx/CVE-2022-33680.json", + "dateUpdated": "2025-01-02T19:03:18.707Z" + }, + { + "cveId": "CVE-2023-35145", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-35145", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/35xxx/CVE-2023-35145.json", + "dateUpdated": "2025-01-02T19:05:01.388Z" + } + ], + "error": [] + }, { "fetchTime": "2025-01-02T18:58:08.024Z", "numberOfChanges": 68, @@ -119763,43 +120383,5 @@ } ], "error": [] - }, - { - "fetchTime": "2024-12-03T19:04:31.812Z", - "numberOfChanges": 5, - "new": [], - "updated": [ - { - "cveId": "CVE-2023-34924", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-34924", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/34xxx/CVE-2023-34924.json", - "dateUpdated": "2024-12-03T18:58:35.785Z" - }, - { - "cveId": "CVE-2023-52727", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-52727", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/52xxx/CVE-2023-52727.json", - "dateUpdated": "2024-12-03T19:03:44.651Z" - }, - { - "cveId": "CVE-2024-21032", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-21032", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/21xxx/CVE-2024-21032.json", - "dateUpdated": "2024-12-03T18:56:04.010Z" - }, - { - "cveId": "CVE-2024-37302", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-37302", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/37xxx/CVE-2024-37302.json", - "dateUpdated": "2024-12-03T18:56:17.082Z" - }, - { - "cveId": "CVE-2024-53938", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53938", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53938.json", - "dateUpdated": "2024-12-03T18:58:39.026Z" - } - ], - "error": [] } ] \ No newline at end of file