Changed |
CPE Configuration |
OR
*cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:-:*:-:*
*cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:-:*
*cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
*cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*
|
OR
*cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.10240.19060
*cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.14393.4651
*cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.17763.2183
*cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.18363.1801
*cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19041.1237
*cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19042.1237
*cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19043.1237
*cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19041.1237
*cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
*cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.14393.4651
*cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.17763.2183
*cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.20348.230
*cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19042.1237
|
Changed |
Reference Type |
http://packetstormsecurity.com/files/164210/Microsoft-Windows-MSHTML-Overview.html Exploit, Third Party Advisory, VDB Entry
|
http://packetstormsecurity.com/files/164210/Microsoft-Windows-MSHTML-Overview.html Third Party Advisory, VDB Entry
|