From 6b07eddc421b3bcac11e239f4abf8e48557cb0a8 Mon Sep 17 00:00:00 2001 From: GitHub Actions Date: Fri, 8 Mar 2024 06:06:50 +0000 Subject: [PATCH] Format markdown files --- ...240308003-Windows-Themes-Spoofing-Vulnerability.md | 11 +++-------- 1 file changed, 3 insertions(+), 8 deletions(-) diff --git a/docs/advisories/20240308003-Windows-Themes-Spoofing-Vulnerability.md b/docs/advisories/20240308003-Windows-Themes-Spoofing-Vulnerability.md index 62091f58..a1349d20 100644 --- a/docs/advisories/20240308003-Windows-Themes-Spoofing-Vulnerability.md +++ b/docs/advisories/20240308003-Windows-Themes-Spoofing-Vulnerability.md @@ -4,19 +4,14 @@ A spoofing vulnerability has been discoverd in Microsoft Themes. The vulnerability allows a remote attacker to perform spoofing attack. - - ## What is vulnerable? -| Product(s) Affected | Summary | Severity | CVSS | -| ------------------- | ------- | ------------ | ---- | -| All Windows versions | [CVE-2024-21320](https://nvd.nist.gov/vuln/detail/CVE-2024-21320) | **Medium** | 6.5 | - +| Product(s) Affected | Summary | Severity | CVSS | +| -------------------- | ----------------------------------------------------------------- | ---------- | ---- | +| All Windows versions | [CVE-2024-21320](https://nvd.nist.gov/vuln/detail/CVE-2024-21320) | **Medium** | 6.5 | ## Recommendation The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *one month...* (refer [Patch Management](../guidelines/patch-management.md)): - [Windows Themes Spoofing Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21320) - -