Changed |
CPE Configuration |
OR
*cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*
*cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*
*cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*
|
OR
*cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.10240.19325
*cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.14393.5192
*cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.17763.3046
*cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19042.1766
*cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19043.1766
*cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19044.1766
*cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.22000.739
*cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.14393.5192
*cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.17763.3046
*cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.20348.770
*cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19042.1766
|
Changed |
Reference Type |
http://packetstormsecurity.com/files/167438/Microsoft-Office-Word-MSDTJS-Code-Execution.html No Types Assigned
|
http://packetstormsecurity.com/files/167438/Microsoft-Office-Word-MSDTJS-Code-Execution.html Exploit, Third Party Advisory, VDB Entry
|