Windows MSHTML Platform Security Feature Bypass Vulnerability
References
Link | Resource |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36805 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
29 May 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-77 |
14 Sep 2023, 00:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:* |
|
First Time |
Microsoft
Microsoft windows Server 2016 Microsoft windows Server 2022 Microsoft windows 10 1809 Microsoft windows 10 22h2 Microsoft windows 10 21h2 Microsoft windows 10 1607 Microsoft windows Server 2019 Microsoft windows 11 22h2 Microsoft windows Server 2012 Microsoft windows 10 1507 Microsoft windows 11 21h2 |
|
CWE | NVD-CWE-noinfo | |
References | (MISC) https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36805 - Patch, Vendor Advisory |
12 Sep 2023, 19:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-12 17:15
Updated : 2024-05-29 03:16
NVD link : CVE-2023-36805
Mitre link : CVE-2023-36805
CVE.ORG link : CVE-2023-36805
JSON object : View
Products Affected
microsoft
- windows_10_22h2
- windows_server_2012
- windows_10_21h2
- windows_11_21h2
- windows_server_2016
- windows_11_22h2
- windows_10_1809
- windows_server_2019
- windows_10_1507
- windows_10_1607
- windows_server_2022
CWE
NVD-CWE-noinfo
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')