Closed Tostti closed 6 days ago
Microsoft Windows Server 2016 Standard version = 10.1.14393.7070
The information provided by NVD is not sufficient to confirm whether the vulnerability has been accurately reported or if a patch version is available. It is necessary to conduct a more thorough search in other sources to gather additional details about the reported issue. This further investigation will enable us to determine the appropriate sanitization measures to apply.
Microsoft Office Standard 2019 - sv-se version = 16.0.10411.20011 Microsoft Office Professional Plus 2019 - sv-se version = 16.0.10411.20011
The information provided by NVD is not sufficient to confirm whether the vulnerability has been accurately reported or if a patch version is available.
The information provided by Microsoft seems to be that the vulnerability only applies to: Microsoft Excel 97, whether shipped alone or as part of Office 97. Microsoft Excel 2000, whether shipped alone or as part of Office 2000.
It is necessary to conduct a more thorough search in other sources to gather additional details about the reported issue. This further investigation will enable us to determine the appropriate sanitization measures to apply.
Microsoft Office Standard 2019 - sv-se version = 16.0.10411.20011 Microsoft Office Professional Plus 2019 - sv-se version = 16.0.10411.20011
The information provided by NVD is not sufficient to confirm whether the vulnerability has been accurately reported or if a patch version is available. It is necessary to conduct a more thorough search in other sources to gather additional details about the reported issue. This further investigation will enable us to determine the appropriate sanitization measures to apply.
https://learn.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058
Microsoft Office Standard 2019 - sv-se version = 16.0.10411.20011 Microsoft Office Professional Plus 2019 - sv-se version = 16.0.10411.20011
The information provided by NVD is not sufficient to confirm whether the vulnerability has been accurately reported or if a patch version is available.
The information provided by Microsoft seems to be that the vulnerability only applies to: Microsoft Office 2000 Service Pack 3 Microsoft Office XP Service Pack 3 Microsoft Office 2003 Service Pack 1 or Service Pack 2 Microsoft Office 2004 for Mac Microsoft Office v. X for Mac
It is necessary to conduct a more thorough search in other sources to gather additional details about the reported issue. This further investigation will enable us to determine the appropriate sanitization measures to apply.
Microsoft Office Standard 2019 - sv-se version = 16.0.10411.20011 Microsoft Office Professional Plus 2019 - sv-se version = 16.0.10411.20011
The information provided by NVD is not sufficient to confirm whether the vulnerability has been accurately reported or if a patch version is available. It is necessary to conduct a more thorough search in other sources to gather additional details about the reported issue. This further investigation will enable us to determine the appropriate sanitization measures to apply.
Microsoft Office Standard 2019 - sv-se version = 16.0.10411.20011 Microsoft Office Professional Plus 2019 - sv-se version = 16.0.10411.20011
The information provided by NVD is not sufficient to confirm whether the vulnerability has been accurately reported or if a patch version is available. It is necessary to conduct a more thorough search in other sources to gather additional details about the reported issue. This further investigation will enable us to determine the appropriate sanitization measures to apply.
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2021-43905
Microsoft Office Standard 2019 - sv-se version = 16.0.10411.20011 Microsoft Office Professional Plus 2019 - sv-se version = 16.0.10411.20011
The information provided by NVD and Microsoft suggests that the vulnerability has been correctly detected.
This is a true positive case. No sanitization is needed.
I move this issue to blocked. When all sanitizations has been applied, this issue can be closed.
Reviewed: awaiting sanitizations.
Reviewed: awaiting sanitizations.
Reviewed: awaiting sanitizations.
Reviewed: awaiting sanitizations.
Sanitizations applied, efficacy tests should be added.
I moved this issue to blocked. When all sanitizations have been applied, the efficacy tests could be done.
Added sanitizations and efficacy test.
Description
A community user has reported that version 4.8.0 of the vulnerability detector incorrectly reports some vulnerabilities. This issue aims to investigate these reports, verify the accuracy of the vulnerability detection, and address any discrepancies. The user didn't provide complete information, only mentioned that it is Windows Server 2022.
Transcription:
Context
Accurate vulnerability detection is critical for maintaining the security and reliability of systems. Incorrectly reported vulnerabilities can lead to unnecessary concerns or, conversely, missed critical security issues. It is essential to thoroughly investigate these reports to ensure the detector's reliability and trustworthiness.
Expected
Steps to Complete
Gather Information:
Analyze Reports:
Document Findings:
Create Sanitization Issues:
Deliverables