var-202111-0660
Vulnerability from variot
Active Directory Domain Services Elevation of Privilege Vulnerability. This vulnerability is CVE-2021-42282 , CVE-2021-42287 , CVE-2021-42291 Is a different vulnerability.You may be elevated. Microsoft Windows Active Directory是美国微软(Microsoft)公司的一个负责架构中大型网络环境的集中式目录管理服务。存储有关网络上对象的信息,并使管理员和用户可以轻松查找和使用这些信息. Microsoft Windows Active Directory存在权限许可和访问控制问题漏洞。以下产品和版本受到影响:Windows Server 2012 R2 (Server Core installation),Windows Server 2019,Windows Server 2019 (Server Core installation),Windows Server 2022,Windows Server 2022 (Server Core installation),Windows Server, version 2004 (Server Core installation),Windows Server, version 20H2 (Server Core Installation),Windows Server 2016,Windows Server 2016 (Server Core installation),Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0660", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "windows server 2004", "scope": "lt", "trust": 1.0, "vendor": "microsoft", "version": "10.0.19041.1348" }, { "model": "windows server 2016", "scope": "lt", "trust": 1.0, "vendor": "microsoft", "version": "10.0.14393.4770" }, { "model": "windows server 20h2", "scope": "lt", "trust": 1.0, "vendor": "microsoft", "version": "10.0.19042.1348" }, { "model": "windows server 2019", "scope": "lt", "trust": 1.0, "vendor": "microsoft", "version": "10.0.17763.2300" }, { "model": "windows server 2012", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "r2" }, { "model": "windows server 2008", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "r2" }, { "model": "windows server 2008", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "windows server 2022", "scope": "lt", "trust": 1.0, "vendor": "microsoft", "version": "10.0.20348.350" }, { "model": "windows server 2012", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2016 (server core installation)" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2012 (server core installation)" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2008 for 32-bit systems sp2" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2008 for x64-based systems sp2" }, { "model": "microsoft windows server 2012", "scope": null, "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": null }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2008 for x64-based systems sp2 (server core installation)" }, { "model": "microsoft windows server 2016", "scope": null, "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": null }, { "model": "microsoft windows server 2008", "scope": null, "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": null }, { "model": "microsoft windows server 2022", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": null }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "20h2 (server core installation)" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2012" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2008 for 32-bit systems sp2 (server core installation)" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2019" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2022 (server core installation)" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2008 r2 for x64-based systems sp1" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2004 (server core installation)" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2012 r2 (server core installation)" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2016" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2012 r2" }, { "model": "microsoft windows server 2022", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "(server core installation)" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2022" }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2008 r2 for x64-based systems sp1 (server core installation)" }, { "model": "microsoft windows server 2019", "scope": null, "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": null }, { "model": "microsoft windows server", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2019 (server core installation)" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-004143" }, { "db": "NVD", "id": "CVE-2021-42278" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-42278" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Catalyst IT and Samba Team", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-797" } ], "trust": 0.6 }, "cve": "CVE-2021-42278", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-42278", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.6, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-42278", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-42278", "trust": 1.8, "value": "HIGH" }, { "author": "secure@microsoft.com", "id": "CVE-2021-42278", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-797", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-42278", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-42278" }, { "db": "JVNDB", "id": "JVNDB-2021-004143" }, { "db": "CNNVD", "id": "CNNVD-202111-797" }, { "db": "NVD", "id": "CVE-2021-42278" }, { "db": "NVD", "id": "CVE-2021-42278" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Active Directory Domain Services Elevation of Privilege Vulnerability. This vulnerability is CVE-2021-42282 , CVE-2021-42287 , CVE-2021-42291 Is a different vulnerability.You may be elevated. Microsoft Windows Active Directory\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u4e2a\u8d1f\u8d23\u67b6\u6784\u4e2d\u5927\u578b\u7f51\u7edc\u73af\u5883\u7684\u96c6\u4e2d\u5f0f\u76ee\u5f55\u7ba1\u7406\u670d\u52a1\u3002\u5b58\u50a8\u6709\u5173\u7f51\u7edc\u4e0a\u5bf9\u8c61\u7684\u4fe1\u606f\uff0c\u5e76\u4f7f\u7ba1\u7406\u5458\u548c\u7528\u6237\u53ef\u4ee5\u8f7b\u677e\u67e5\u627e\u548c\u4f7f\u7528\u8fd9\u4e9b\u4fe1\u606f. \nMicrosoft Windows Active Directory\u5b58\u5728\u6743\u9650\u8bb8\u53ef\u548c\u8bbf\u95ee\u63a7\u5236\u95ee\u9898\u6f0f\u6d1e\u3002\u4ee5\u4e0b\u4ea7\u54c1\u548c\u7248\u672c\u53d7\u5230\u5f71\u54cd\uff1aWindows Server 2012 R2 (Server Core installation),Windows Server 2019,Windows Server 2019 (Server Core installation),Windows Server 2022,Windows Server 2022 (Server Core installation),Windows Server, version 2004 (Server Core installation),Windows Server, version 20H2 (Server Core Installation),Windows Server 2016,Windows Server 2016 (Server Core installation),Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2", "sources": [ { "db": "NVD", "id": "CVE-2021-42278" }, { "db": "JVNDB", "id": "JVNDB-2021-004143" }, { "db": "CNNVD", "id": "CNNVD-202111-797" }, { "db": "VULMON", "id": "CVE-2021-42278" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-42278", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2021-004143", "trust": 0.8 }, { "db": "CS-HELP", "id": "SB2021110914", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202111-797", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-42278", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-42278" }, { "db": "JVNDB", "id": "JVNDB-2021-004143" }, { "db": "CNNVD", "id": "CNNVD-202111-797" }, { "db": "NVD", "id": "CVE-2021-42278" } ] }, "id": "VAR-202111-0660", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2024-07-04T22:48:15.754000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Active\u00a0Directory\u00a0Domain\u00a0Services\u00a0Elevation\u00a0of\u00a0Privilege\u00a0Vulnerability Security Update Guide", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2021-42278" }, { "title": "Microsoft Windows Active Directory Fixes for permissions and access control issues vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=169140" }, { "title": "Introduction\nGetting started\nHow LDAP Firewall works\nCan I contribute?\nWe would love to hear from you!\nLicense information", "trust": 0.1, "url": "https://github.com/mre-fog/ldapfw " }, { "title": "Windows Privilege Escalation Cheatsheet", "trust": 0.1, "url": "https://github.com/edsonjt81/windows-privilege-escalation " }, { "title": "Invoke-sAMSpoofing", "trust": 0.1, "url": "https://github.com/xiaolichan/invoke-samspoofing " }, { "title": "Introduction\nGetting started\nHow LDAP Firewall works\nCan I contribute?\nWe would love to hear from you!\nLicense information", "trust": 0.1, "url": "https://github.com/zeronetworks/ldapfw " }, { "title": "Windows Privilege Escalation Cheatsheet\nFollow us on", "trust": 0.1, "url": "https://github.com/racho-prg/windows_escalada_privilegios " }, { "title": "Windows Privilege Escalation Cheatsheet\nFollow us on", "trust": 0.1, "url": "https://github.com/ignitetechnologies/windows-privilege-escalation " }, { "title": "Windows Privilege Escalation Cheatsheet\nFollow us on", "trust": 0.1, "url": "https://github.com/whoami-chmod777/hacking-articles-windows-privilege-escalation " }, { "title": "Windows Privilege Escalation Cheatsheet\nFollow us on", "trust": 0.1, "url": "https://github.com/nxpnch/windows-privesc " }, { "title": "sAMAccountName-Spoofing", "trust": 0.1, "url": "https://github.com/iaminzoho/samaccountname-spoofing " }, { "title": "noPac", "trust": 0.1, "url": "https://github.com/cyb3rpeace/nopac " }, { "title": "Invoke-noPac", "trust": 0.1, "url": "https://github.com/ricardojba/invoke-nopac " }, { "title": "", "trust": 0.1, "url": "https://github.com/shengshengli/getdomainadmin " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-42278" }, { "db": "JVNDB", "id": "JVNDB-2021-004143" }, { "db": "CNNVD", "id": "CNNVD-202111-797" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-004143" }, { "db": "NVD", "id": "CVE-2021-42278" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2021-42278" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-42278" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20211110-ms.html" }, { "trust": 0.8, "url": "https://www.jpcert.or.jp/at/2021/at210048.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/windows-vulnerabilities-of-november-2021-36842" }, { "trust": 0.6, "url": "https://msrc.microsoft.com/update-guide/vulnerability/cve-2021-42278" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021110914" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-004143" }, { "db": "CNNVD", "id": "CNNVD-202111-797" }, { "db": "NVD", "id": "CVE-2021-42278" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2021-42278" }, { "db": "JVNDB", "id": "JVNDB-2021-004143" }, { "db": "CNNVD", "id": "CNNVD-202111-797" }, { "db": "NVD", "id": "CVE-2021-42278" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-10T00:00:00", "db": "VULMON", "id": "CVE-2021-42278" }, { "date": "2021-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-004143" }, { "date": "2021-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-797" }, { "date": "2021-11-10T01:19:44.300000", "db": "NVD", "id": "CVE-2021-42278" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-12-28T00:00:00", "db": "VULMON", "id": "CVE-2021-42278" }, { "date": "2021-11-15T08:53:00", "db": "JVNDB", "id": "JVNDB-2021-004143" }, { "date": "2021-11-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-797" }, { "date": "2024-07-03T13:33:20.297000", "db": "NVD", "id": "CVE-2021-42278" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-797" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microsoft\u00a0Windows\u00a0Server\u00a0 Vulnerability to elevate privileges in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-004143" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-797" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.