Vendor | Product | Version |
---|---|---|
microsoft | windows_10_1507 | 𝑥 < 10.0.10240.20232 |
microsoft | windows_10_1507 | 𝑥 < 10.0.10240.20232 |
microsoft | windows_10_1809 | 𝑥 < 10.0.17763.4974 |
microsoft | windows_10_1809 | 𝑥 < 10.0.17763.4974 |
microsoft | windows_10_1809 | 𝑥 < 10.0.17763.4974 |
microsoft | windows_10_21h1 | 𝑥 < 10.0.19041.3570 |
microsoft | windows_10_21h1 | 𝑥 < 10.0.19041.3570 |
microsoft | windows_10_21h1 | 𝑥 < 10.0.19041.3570 |
microsoft | windows_10_22h2 | 𝑥 < 10.0.19041.3570 |
microsoft | windows_10_22h2 | 𝑥 < 10.0.19041.3570 |
microsoft | windows_10_22h2 | 𝑥 < 10.0.19041.3570 |
microsoft | windows_11_21h2 | 𝑥 < 10.0.22000.2538 |
microsoft | windows_11_21h2 | 𝑥 < 10.0.22000.2538 |
microsoft | windows_11_22h2 | 𝑥 < 10.0.22621.2428 |
microsoft | windows_11_22h2 | 𝑥 < 10.0.22621.2428 |
microsoft | windows_server_2012 | - |
microsoft | windows_server_2016 | - |
microsoft | windows_server_2019 | - |
microsoft | windows_server_2022 | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-822 - Untrusted Pointer DereferenceThe program obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.
- CWE-668 - Exposure of Resource to Wrong SphereThe product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.