目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2021-28455— Microsoft Jet Database Engine 命令注入漏洞

CVSS 8.8 · High EPSS 10.56% · P93
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2021-28455の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability
ソース: NVD (National Vulnerability Database)
脆弱性説明
Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Microsoft Jet Database Engine 命令注入漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Microsoft Jet Database Engine是美国微软(Microsoft)公司的一个应用程序。一个数据库引擎。 Jet Red and Access Connectivity存在命令注入漏洞。以下产品和版本受到影响:Microsoft Office 2019 for 32-bit editions,Microsoft Office 2019 for 64-bit editions,Microsoft 365 Apps for Enterprise for 32-bit Systems,Mi
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
MicrosoftMicrosoft Access 2013 Service Pack 1 (32-bit editions) 15.0.0 ~ 15.0.5353.1000 cpe:2.3:a:microsoft:access:2013:sp1:*:*:*:*:*:*
MicrosoftMicrosoft Access 2013 Service Pack 1 (64-bit editions) 15.0.0 ~ 15.0.5353.1000 cpe:2.3:a:microsoft:access:2013:sp1:*:*:*:*:*:*
MicrosoftMicrosoft Office 2019 19.0.0 ~ https://aka.ms/OfficeSecurityReleases cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*
MicrosoftMicrosoft 365 Apps for Enterprise 16.0.1 ~ https://aka.ms/OfficeSecurityReleases cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*
MicrosoftMicrosoft Office 2016 16.0.0 ~ 16.0.5161.1001 cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*
MicrosoftMicrosoft Access 2016 (32-bit edition) 16.0.0 ~ publication cpe:2.3:a:microsoft:access:2016:*:*:*:*:*:*:*
MicrosoftMicrosoft Access 2016 (64-bit edition) 16.0.0 ~ publication cpe:2.3:a:microsoft:access:2016:*:*:*:*:*:*:*
MicrosoftMicrosoft Office 2013 Service Pack 1 15.0.0 ~ 15.0.5345.1001 cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*
MicrosoftWindows 10 Version 1803 10.0.0 ~ 10.0.17134.2207 cpe:2.3:o:microsoft:windows_10_1809:10.0.17134.2207:*:*:*:*:*:x64:*
MicrosoftWindows 10 Version 1809 10.0.0 ~ 10.0.17763.1935 cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:x86:*
MicrosoftWindows Server 2019 10.0.0 ~ 10.0.17763.1935 cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1935:*:*:*:*:*:*:*
MicrosoftWindows Server 2019 (Server Core installation) 10.0.0 ~ 10.0.17763.1935 cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1935:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1909 10.0.0 ~ 10.0.18363.1556 cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1556:*:*:*:*:*:x86:*
MicrosoftWindows Server, version 1909 (Server Core installation) 10.0.0 ~ 10.0.18363.1556 cpe:2.3:o:microsoft:windows_server_1909:10.0.18363.1556:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 2004 10.0.0 ~ 10.0.19041.982 cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.982:*:*:*:*:*:x64:*
MicrosoftWindows Server version 2004 10.0.0 ~ 10.0.19041.982 cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.982:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 20H2 10.0.0 ~ 10.0.19042.982 cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.982:*:*:*:*:*:x86:*
MicrosoftWindows Server version 20H2 10.0.0 ~ 10.0.19042.982 cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.982:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1507 10.0.0 ~ 10.0.10240.18931 cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18931:*:*:*:*:*:x86:*
MicrosoftWindows 10 Version 1607 10.0.0 ~ 10.0.14393.4401 cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4401:*:*:*:*:*:x86:*
MicrosoftWindows Server 2016 10.0.0 ~ 10.0.14393.4401 cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4401:*:*:*:*:*:*:*
MicrosoftWindows Server 2016 (Server Core installation) 10.0.0 ~ 10.0.14393.4401 cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4401:*:*:*:*:*:*:*
MicrosoftWindows 7 6.1.0 ~ 6.1.7601.24597 cpe:2.3:o:microsoft:windows_7:6.1.7601.24597:sp1:*:*:*:*:x86:*
MicrosoftWindows 7 Service Pack 1 6.1.0 ~ 6.1.7601.24597 cpe:2.3:o:microsoft:windows_7:6.1.7601.24597:sp1:*:*:*:*:x64:*
MicrosoftWindows 8.1 6.3.0 ~ 6.3.9600.20017 cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20017:*:*:*:*:*:x86:*
MicrosoftWindows Server 2008 Service Pack 2 6.0.0 ~ 6.0.6003.21117 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21117:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 Service Pack 2 (Server Core installation) 6.0.0 ~ 6.0.6003.21117 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21117:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 Service Pack 2 6.0.0 ~ 6.0.6003.21117 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21117:*:*:*:*:*:x86:*
MicrosoftWindows Server 2008 R2 Service Pack 1 6.1.0 ~ 6.1.7601.24597 cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.24597:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 R2 Service Pack 1 (Server Core installation) 6.0.0 ~ 6.1.7601.24597 cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.24597:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 6.2.0 ~ 6.2.9200.23347 cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23347:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 (Server Core installation) 6.2.0 ~ 6.2.9200.23347 cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23347:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 6.3.0 ~ 6.3.9600.20017 cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20017:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.0 ~ 6.3.9600.20017 cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20017:*:*:*:*:*:x64:*

II. CVE-2021-28455の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2021-28455のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2021-05-11 · 52 CVEs total

CVE-2021-284769.9 CRITICALWindows Hyper-V Remote Code Execution Vulnerability
CVE-2021-311669.8 CRITICALHTTP Protocol Stack Remote Code Execution Vulnerability
CVE-2021-284748.8 HIGHMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2021-311818.8 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2021-270688.8 HIGHVisual Studio Remote Code Execution Vulnerability
CVE-2021-311948.8 HIGHOLE Automation Remote Code Execution Vulnerability
CVE-2021-311937.8 HIGHWindows SSDP Service Elevation of Privilege Vulnerability
CVE-2021-311777.8 HIGHMicrosoft Office Remote Code Execution Vulnerability
CVE-2021-311657.8 HIGHWindows Container Manager Service Elevation of Privilege Vulnerability
CVE-2021-311677.8 HIGHWindows Container Manager Service Elevation of Privilege Vulnerability
CVE-2021-312087.8 HIGHWindows Container Manager Service Elevation of Privilege Vulnerability
CVE-2021-311887.8 HIGHWindows Graphics Component Elevation of Privilege Vulnerability
CVE-2021-311907.8 HIGHWindows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability
CVE-2021-311877.8 HIGHWindows WalletService Elevation of Privilege Vulnerability
CVE-2021-284657.8 HIGHWeb Media Extensions Remote Code Execution Vulnerability
CVE-2021-311767.8 HIGHMicrosoft Office Remote Code Execution Vulnerability
CVE-2021-311757.8 HIGHMicrosoft Office Remote Code Execution Vulnerability
CVE-2021-311807.8 HIGHMicrosoft Office Graphics Remote Code Execution Vulnerability
CVE-2021-312147.8 HIGHVisual Studio Code Remote Code Execution Vulnerability
CVE-2021-311797.8 HIGHMicrosoft Office Remote Code Execution Vulnerability

Showing 20 of 52 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2021-28455へのコメント

まだコメントはありません


コメントを残す