p0w3rsh3ll

Results 30 comments of p0w3rsh3ll

@PlagueHO ping for review :-)

Indeed, here's how to reproduce: ```powershell $Error.Clear() Invoke-RestMethod -Method get -Uri 'https://api.msrc.microsoft.com/cvrf/v2.0/Updates?$filter=InitialReleaseDate gt 2023-01-10T08:00:00Z' $Error| fl * -Force ``` It returns 'Response status code does not indicate success: 500 (CVRF...

Hi, I don't think this has ever been an official API Url to get info. If you need to get info (parse) from the page with automation, the only thing...

Hi, This update was probably present on the page https://msrc.microsoft.com/update-guide/en-us/vulnerability/ADV990001 when it was at revision 46.0 in March 2022. Its support page https://support.microsoft.com/kb/5011570 has a link to the SSU main...

Hello, As far as I can tell the AffectedFiles is returned by the API since the beginning (April 2016). It's just empty. Currently, if you want to know what files...

Using the MSRC API you get the productname and its CVE. Using additional code, you can then visit for example https://nvd.nist.gov/vuln/detail/CVE-2021-1675 and parse the page to extract CPE. NIST may...

Hello @vishparekh, Can you please review this PR? Thanks Best regards

I don't think that there's a general method to do this. Here we deal with the MSRC API that aims at communicating what vulnerabilities are found and fixed. It uses...

Hello, As far I as know, currently, you cannot get the latest version of a given OS build with this API.

`Get-KBDownloadUrl` is a public function in the module but it's only consumed by ` Get-MsrcVulnerabilityReportHtml` that uses input from `Get-MsrcCvrfAffectedSoftware` to insert a clickable link into the html report created....