Descripción
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, execute arbitrary code, gain privileges, bypass security restrictions.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Media Center Update can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Security Support Provider Interface can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Fast FAT File System Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Remote Desktop Protocol Client can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows HTML Platforms can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows NT Lan Manager Datagram Receiver Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows NT OS Kernel can be exploited remotely to gain privileges.
- A denial of service vulnerability in Point-to-Point Tunneling Protocol can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows ALPC can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Fax and Scan Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows PDEV can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Inking COM can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows CD-ROM Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Event Tracing can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Media Foundation can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
Notas informativas originales
- CVE-2022-21973
- CVE-2022-23285
- CVE-2022-23296
- CVE-2022-24454
- CVE-2022-23293
- CVE-2022-24503
- CVE-2022-24502
- CVE-2022-23297
- CVE-2022-23298
- CVE-2022-23253
- CVE-2022-23283
- CVE-2022-24459
- CVE-2022-21990
- CVE-2022-23299
- CVE-2022-23290
- CVE-2022-24455
- CVE-2022-23294
- CVE-2022-21977
- CVE-2022-21975
- CVE-2022-22010
- CVE-2022-23284
Explotación
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Productos relacionados
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
Lista CVE
- CVE-2022-23281 high
- CVE-2022-21973 high
- CVE-2022-23285 critical
- CVE-2022-23296 critical
- CVE-2022-24454 critical
- CVE-2022-23293 critical
- CVE-2022-24503 high
- CVE-2022-24502 high
- CVE-2022-23297 high
- CVE-2022-23298 high
- CVE-2022-23253 high
- CVE-2022-23283 high
- CVE-2022-24459 critical
- CVE-2022-21990 critical
- CVE-2022-23299 critical
- CVE-2022-23290 critical
- CVE-2022-23294 critical
- CVE-2022-22010 high
- CVE-2022-21977 warning
- CVE-2022-24455 critical
- CVE-2022-21975 warning
- CVE-2022-23284 high
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!