Vendor | Product | Version |
---|---|---|
microsoft | powershell | 7.2 ≤ 𝑥 < 7.2.17 |
microsoft | powershell | 7.3 ≤ 𝑥 < 7.3.10 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-798 - Use of Hard-coded CredentialsThe software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
- CWE-668 - Exposure of Resource to Wrong SphereThe product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.