{"@odata.context":"https://api.msrc.microsoft.com/sug/v2.0/sugodata/v2.0/en-US/$metadata#vulnerability/$entity","id":"00000000-0000-0000-0000-0000d68478e8","releaseDate":"2021-04-13T07:00:00Z","cveNumber":"CVE-2021-28324","cveTitle":"Windows SMB Information Disclosure Vulnerability","releaseNumber":"2021-Apr","vulnType":"Security Vulnerability","latestRevisionDate":"2021-04-13T07:00:00Z","cweList":[],"cweDetailsListForSearch":[],"mitreText":"CVE-2021-28324","mitreUrl":"https://www.cve.org/CVERecord?id=CVE-2021-28324","publiclyDisclosed":"No","exploited":"No","latestSoftwareReleaseId":1,"latestSoftwareRelease":"Exploitation More Likely","olderSoftwareReleaseId":1,"olderSoftwareRelease":"Exploitation More Likely","denialOfService":"N/A","tag":"Windows SMB Server","issuingCna":"Microsoft","issuingCnaId":0,"severityId":0,"impactId":0,"langCode":"en-US","baseScore":"7.5","temporalScore":"6.5","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C","isMariner":false,"customerActionRequired":true,"customerActionRequiredId":0,"cweDetailsList":[],"articles":[{"articleType":"FAQ","description":"<p><strong>What type of information could be disclosed by this vulnerability?</strong></p>\n<p>The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mode process.</p>\n","ordinal":10000}],"revisions":[{"cveNumber":"CVE-2021-28324","version":1,"revisionDate":"2021-04-13T07:00:00Z","initialDate":"0001-01-01T00:00:00Z","description":"<p>Information published.</p>\n","unformattedDescription":"Information published.","notificationNeeded":false,"notificationSent":false,"sourceId":"26d83d87-a285-eb11-a838-000d3a6d3364"}]}