Skip to content

Commit

Permalink
Format markdown docs
Browse files Browse the repository at this point in the history
  • Loading branch information
DamoOne authored and github-actions[bot] committed Dec 27, 2024
1 parent ec38221 commit 0b4ce88
Showing 1 changed file with 24 additions and 24 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -6,30 +6,30 @@ WASOC has become aware of a proof-of-concept(POC) exploit code available for Win

## What is vulnerable?

| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
| ------------------- | ---------- | ---- | -------- | ------------ |
| Windows Server 2022, 23H2 Edition (Server Core installation) | Versions prior to 10.0.25398.950 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 11 Version 23H2 for x64-based Systems | Versions prior to 10.0.22631.3737 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 22H2 for x64-based Systems | Versions prior to 10.0.19045.4529 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 11 Version 22H2 for ARM64-based Systems | Versions prior to 10.0.22621.3737 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 21H2 for x64-based Systems | Versions prior to 10.0.19044.4529 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 22H2 for 32-bit Systems | Versions prior to 10.0.19045.4529 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 22H2 for ARM64-based Systems | Versions prior to 10.0.19045.4529 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 21H2 for ARM64-based Systems | Versions prior to 10.0.19044.4529 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 11 Version 23H2 for ARM64-based Systems | Versions prior to 10.0.22631.3737 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 11 Version 22H2 for x64-based Systems | Versions prior to 10.0.22621.3737 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 11 version 21H2 for ARM64-based Systems | Versions prior to 10.0.22000.3019 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 21H2 for 32-bit Systems | Versions prior to 10.0.19044.4529 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 1809 for x64-based Systems | Versions prior to 10.0.17763.5936 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows Server 2019 | Versions prior to 10.0.17763.5936 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows Server 2019 (Server Core installation) | Versions prior to 10.0.17763.5936 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 1809 for ARM64-based Systems | Versions prior to 10.0.17763.5936 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 1809 for 32-bit Systems | Versions prior to 10.0.17763.5936 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows Server 2022 | Versions prior to 10.0.20348.2527 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows Server 2022 | Versions prior to 10.0.20348.2522 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows Server 2022 (Server Core installation) | Versions prior to 10.0.20348.2527 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows Server 2022 (Server Core installation) | Versions prior to 10.0.20348.2522 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 11 version 21H2 for x64-based Systems | Versions prior to 10.0.22000.3019 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
| ------------------------------------------------------------ | --------------------------------- | ----------------------------------------------------------------- | ---- | -------- |
| Windows Server 2022, 23H2 Edition (Server Core installation) | Versions prior to 10.0.25398.950 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 11 Version 23H2 for x64-based Systems | Versions prior to 10.0.22631.3737 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 22H2 for x64-based Systems | Versions prior to 10.0.19045.4529 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 11 Version 22H2 for ARM64-based Systems | Versions prior to 10.0.22621.3737 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 21H2 for x64-based Systems | Versions prior to 10.0.19044.4529 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 22H2 for 32-bit Systems | Versions prior to 10.0.19045.4529 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 22H2 for ARM64-based Systems | Versions prior to 10.0.19045.4529 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 21H2 for ARM64-based Systems | Versions prior to 10.0.19044.4529 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 11 Version 23H2 for ARM64-based Systems | Versions prior to 10.0.22631.3737 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 11 Version 22H2 for x64-based Systems | Versions prior to 10.0.22621.3737 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 11 version 21H2 for ARM64-based Systems | Versions prior to 10.0.22000.3019 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 21H2 for 32-bit Systems | Versions prior to 10.0.19044.4529 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 1809 for x64-based Systems | Versions prior to 10.0.17763.5936 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows Server 2019 | Versions prior to 10.0.17763.5936 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows Server 2019 (Server Core installation) | Versions prior to 10.0.17763.5936 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 1809 for ARM64-based Systems | Versions prior to 10.0.17763.5936 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 10 Version 1809 for 32-bit Systems | Versions prior to 10.0.17763.5936 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows Server 2022 | Versions prior to 10.0.20348.2527 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows Server 2022 | Versions prior to 10.0.20348.2522 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows Server 2022 (Server Core installation) | Versions prior to 10.0.20348.2527 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows Server 2022 (Server Core installation) | Versions prior to 10.0.20348.2522 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |
| Windows 11 version 21H2 for x64-based Systems | Versions prior to 10.0.22000.3019 | [CVE-2024-30085](https://nvd.nist.gov/vuln/detail/CVE-2024-30085) | 7.8 | High |

## Recommendation

Expand Down

0 comments on commit 0b4ce88

Please sign in to comment.