Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:a:microsoft:forefront_security:-:*:*:*:*:*:*:*
*cpe:2.3:a:microsoft:malware_protection_engine:1.1.13701.0:*:*:*:*:*:*:* (and previous)
*cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*
OR
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:-:-:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
|
Added |
CVSS V2 |
|
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
|
Added |
CVSS V3 |
|
AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
Added |
CWE |
|
CWE-119
|
Changed |
Reference Type |
http://www.securityfocus.com/bid/98330 No Types Assigned
|
http://www.securityfocus.com/bid/98330 Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
https://arstechnica.com/information-technology/2017/05/windows-defender-nscript-remote-vulnerability/ No Types Assigned
|
https://arstechnica.com/information-technology/2017/05/windows-defender-nscript-remote-vulnerability/ Press/Media Coverage, Third Party Advisory
|
Changed |
Reference Type |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1252 No Types Assigned
|
https://bugs.chromium.org/p/project-zero/issues/detail?id=1252 Exploit, Third Party Advisory
|
Changed |
Reference Type |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0290 No Types Assigned
|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0290 Vendor Advisory
|
Changed |
Reference Type |
https://technet.microsoft.com/library/security/4022344 No Types Assigned
|
https://technet.microsoft.com/library/security/4022344 Patch, Vendor Advisory
|
Changed |
Reference Type |
https://twitter.com/natashenka/status/861748397409058816 No Types Assigned
|
https://twitter.com/natashenka/status/861748397409058816 Exploit, Third Party Advisory
|