An elevation of privilege vulnerability exists when the Windows Language Pack Installer improperly handles file operations, aka 'Windows Language Pack Installer Elevation of Privilege Vulnerability'.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0822 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Nov 2021, 22:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Nov 2021, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Nov 2021, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Sep 2021, 14:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:axis2:1.7.9:*:*:*:*:*:*:* |
16 Sep 2021, 13:17
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.apache.org/thread.html/reddd31784f5cf8dfb80e473ae1d4f0f28a8367362bd7edaeb2988f86@%3Cdev.tomcat.apache.org%3E - Mailing List, Third Party Advisory |
15 Sep 2021, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Sep 2021, 13:27
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.apache.org/thread.html/r6dbbfd80c4b335685e2a561f85013593e7b99934d4cdfc5fc129f4ce@%3Cdev.tomcat.apache.org%3E - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/rf3058e80123e804b74face024752c1ded5213e63011de139f25977bc@%3Cdev.tomcat.apache.org%3E - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:a:apache:tomcat:9.0.52:*:*:*:*:*:*:* |
24 Aug 2021, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Aug 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References |
|
26 May 2021, 13:38
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.apache.org/thread.html/r492afeeeb1bfe484f2f4a1f5d296eee49b13eb0c579ac460e3d7d957@%3Cjava-user.axis.apache.org%3E - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r258f18d563859c0ef9584fd7341426bd14f5042bdf7e7bc396d91272@%3Cjava-dev.axis.apache.org%3E - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r31d9c450e6d84e82e85c2dd1a7586f56ae4ed6776e5b8765c30fe2ac@%3Cjava-user.axis.apache.org%3E - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r02687681920bb91816b735cc48847eef77c473a749678d855fbb565d@%3Cjava-dev.axis.apache.org%3E - Mailing List, Third Party Advisory |
25 May 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 May 2021, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-03-12 16:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-0822
Mitre link : CVE-2020-0822
CVE.ORG link : CVE-2020-0822
JSON object : View
Products Affected
microsoft
- windows_server_2012
- windows_server_2016
- windows_server_2008
- windows_server_2019
- windows_rt_8.1
- windows_7
- windows_8.1
- windows_10
CWE