Assigner | microsoft |
Reserved | 2023-11-28 |
Published | 2024-01-09 |
Updated | 2024-07-19 |
Description
Windows HTML Platforms Security Feature Bypass Vulnerability
HIGH: 8.1 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Problem types
CWE-73: External Control of File Name or Path
Product status
10.0.0 before 10.0.17763.5329
affected
10.0.0 before 10.0.17763.5329
affected
10.0.0 before 10.0.17763.5329
affected
10.0.0 before 10.0.20348.2227
affected
10.0.0 before 10.0.22000.2713
affected
10.0.0 before 10.0.19044.3930
affected
10.0.0 before 10.0.22621.3007
affected
10.0.0 before 10.0.19045.3930
affected
10.0.0 before 10.0.10240.20402
affected
10.0.0 before 10.0.14393.6614
affected
10.0.0 before 10.0.14393.6614
affected
10.0.0 before 10.0.14393.6614
affected
6.1.0 before 6.1.7601.26910
affected
6.1.0 before 1.001
affected
6.0.0 before 6.1.7601.26910
affected
6.0.0 before 1.001
affected
6.2.0 before 6.2.9200.24664
affected
6.2.0 before 1.001
affected
6.2.0 before 6.2.9200.24664
affected
6.2.0 before 1.001
affected
6.3.0 before 6.3.9600.21765
affected
6.3.0 before 1.001
affected
6.3.0 before 6.3.9600.21765
affected
6.3.0 before 1.001
affected
10.0.0 before 10.0.22631.3007
affected
10.0.0 before 10.0.25398.643
affected
10.0.0 before 10.0.22631.3007
affected
References
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20652 (Windows HTML Platforms Security Feature Bypass Vulnerability) vendor-advisory
cve.org CVE-2024-20652
nvd.nist.gov CVE-2024-20652
Download JSON