{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-35619","assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","state":"PUBLISHED","assignerShortName":"microsoft","dateReserved":"2023-06-15T01:03:28.506Z","datePublished":"2023-12-12T18:10:56.181Z","dateUpdated":"2025-01-01T02:18:44.656Z"},"containers":{"cna":{"title":"Microsoft Outlook for Mac Spoofing Vulnerability","datePublic":"2023-12-12T08:00:00.000Z","cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office_long_term_servicing_channel:*:*:*:*:*:macos:*:*","versionStartIncluding":"16.0.1","versionEndExcluding":"16.80.23121017"}]}]}],"affected":[{"vendor":"Microsoft","product":"Microsoft Office LTSC for Mac 2021","platforms":["Unknown"],"versions":[{"version":"16.0.1","lessThan":"16.80.23121017","versionType":"custom","status":"affected"}]}],"descriptions":[{"value":"Microsoft Outlook for Mac Spoofing Vulnerability","lang":"en-US"}],"problemTypes":[{"descriptions":[{"description":"CWE-20: Improper Input Validation","lang":"en-US","type":"CWE","cweId":"CWE-20"}]}],"providerMetadata":{"orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft","dateUpdated":"2025-01-01T02:18:44.656Z"},"references":[{"name":"Microsoft Outlook for Mac Spoofing Vulnerability","tags":["vendor-advisory"],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35619"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseSeverity":"MEDIUM","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T16:23:59.714Z"},"title":"CVE Program Container","references":[{"name":"Microsoft Outlook for Mac Spoofing Vulnerability","tags":["vendor-advisory","x_transferred"],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35619"}]}]}}