U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2022-24512

Change History

Modified Analysis by NIST 12/20/2023 8:43:56 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:microsoft:.net:5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:.net_core:3.1:-:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:* versions from (including) 7.0 up to (excluding) 7.0.9
     *cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:* versions from (including) 7.1 up to (excluding) 7.1.6
     *cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:* versions from (including) 7.2 up to (excluding) 7.2.2
     *cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (including) 16.6.4
     *cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* versions from (including) 16.7.0 up to (excluding) 16.7.26
     *cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* versions from (including) 16.8.0 up to (including) 16.8.7
     *cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* versions from (including) 16.9.0 up to (excluding) 16.9.18
     *cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* versions from (including) 16.10.0 up to (including) 16.10.4
     *cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* versions from (including) 16.11.0 up to (excluding) 16.11.11
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.0.0 up to (excluding) 17.0.7
OR
     *cpe:2.3:a:microsoft:.net:5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:.net_core:3.1:-:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:* versions from (including) 7.0 up to (excluding) 7.0.9
     *cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:* versions from (including) 7.1 up to (excluding) 7.1.6
     *cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:* versions from (including) 7.2 up to (excluding) 7.2.2
     *cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (including) 16.6.4
     *cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* versions from (including) 16.7.0 up to (excluding) 16.7.26
     *cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* versions from (including) 16.8.0 up to (including) 16.8.7
     *cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* versions from (including) 16.9.0 up to (excluding) 16.9.18
     *cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* versions from (including) 16.10.0 up to (including) 16.10.4
     *cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* versions from (including) 16.11.0 up to (excluding) 16.11.11
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.0.7
Changed Reference Type
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24512 No Types Assigned
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24512 Patch, Vendor Advisory