Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, obtain sensitive information.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Connected User Experiences and Telemetry can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Cluster Shared Volume (CSV) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Fax Compose Form can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Hyper-V Shared Virtual Hard Disks can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in PowerShell can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Win32 File Enumeration can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Cluster Client Failover (CCF) can be exploited remotely to gain privileges.
- Information disclosure vulnerability in Windows iSCSI Target Service can be exploited to obtain sensitive information.
- An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Remote Desktop Protocol can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Graphics Component can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Cluster Shared Volume (CSV) can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows SMB can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Server Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Kerberos can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Network File System can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows AppX Package Manager can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Upgrade Assistant can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Stream Enumeration can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Secure Channel can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Win32 Stream Enumeration can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows LDAP can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Win32k can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Bluetooth Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows File Server Resource Management Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Local Security Authority (LSA) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in DiskUsage.exe can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Desktop Bridge can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in HEVC Video Extensions can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows User Profile Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows LDAP can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows File Explorer can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Microsoft Local Security Authority (LSA) Server can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Local Security Authority (LSA) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Work Folder Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Digital Media Receiver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows ALPC can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Direct Show can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows DNS Server can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Telephony Server can be exploited remotely to gain privileges.
Первичный источник обнаружения
- CVE-2022-26917
CVE-2022-26803
CVE-2022-26788
CVE-2022-26791
CVE-2022-26789
CVE-2022-26825
CVE-2022-26822
CVE-2022-26802
CVE-2022-26795
CVE-2022-26920
CVE-2022-26813
CVE-2022-26801
CVE-2022-26796
CVE-2022-26916
CVE-2022-26812
CVE-2022-26793
CVE-2022-26821
CVE-2022-24549
CVE-2022-26915
CVE-2022-26831
CVE-2022-26828
CVE-2022-26810
CVE-2022-26792
CVE-2022-26786
CVE-2022-26918
CVE-2022-26904
CVE-2022-26819
CVE-2022-26826
CVE-2022-26809
CVE-2022-26919
CVE-2022-26808
CVE-2022-26798
CVE-2022-26807
CVE-2022-26824
CVE-2022-26787
CVE-2022-26797
CVE-2022-26827
CVE-2022-26823
CVE-2022-26790
CVE-2022-26794
CVE-2022-26811
CVE-2022-26820
CVE-2022-24479
CVE-2022-23257
CVE-2022-26784
CVE-2022-24539
CVE-2022-24485
CVE-2022-24489
CVE-2022-24498
CVE-2022-24536
CVE-2022-24533
CVE-2022-26903
CVE-2022-24538
CVE-2022-24521
CVE-2022-24500
CVE-2022-24541
CVE-2022-24545
CVE-2022-24491
CVE-2022-23268
CVE-2022-26818
CVE-2022-24543
CVE-2022-21983
CVE-2022-24537
CVE-2022-26829
CVE-2022-22008
CVE-2022-24534
CVE-2022-24499
CVE-2022-24542
CVE-2022-24528
CVE-2022-24487
CVE-2022-26830
CVE-2022-24490
CVE-2022-24488
CVE-2022-26815
CVE-2022-24494
CVE-2022-24483
CVE-2022-24484
CVE-2022-26814
CVE-2022-24532
CVE-2022-24492
CVE-2022-22009
CVE-2022-24493
CVE-2022-24496
CVE-2022-26785
CVE-2022-26783
CVE-2022-24530
CVE-2022-26817
CVE-2022-24481
CVE-2022-24474
CVE-2022-24546
CVE-2022-24486
CVE-2022-24547
CVE-2022-24544
CVE-2022-24540
CVE-2022-24495
CVE-2022-26816
CVE-2022-26914
CVE-2022-24550
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
Список CVE
- CVE-2022-24479 critical
- CVE-2022-23257 critical
- CVE-2022-26784 high
- CVE-2022-26917 critical
- CVE-2022-24539 critical
- CVE-2022-26803 critical
- CVE-2022-26788 critical
- CVE-2022-26791 critical
- CVE-2022-24485 critical
- CVE-2022-26789 critical
- CVE-2022-26825 high
- CVE-2022-26822 high
- CVE-2022-26802 critical
- CVE-2022-24489 critical
- CVE-2022-24498 high
- CVE-2022-26795 critical
- CVE-2022-26920 high
- CVE-2022-24536 high
- CVE-2022-26813 high
- CVE-2022-24533 critical
- CVE-2022-26903 critical
- CVE-2022-24538 high
- CVE-2022-26801 critical
- CVE-2022-24521 critical
- CVE-2022-24500 critical
- CVE-2022-24541 critical
- CVE-2022-26796 critical
- CVE-2022-24545 critical
- CVE-2022-26916 critical
- CVE-2022-26812 high
- CVE-2022-26793 critical
- CVE-2022-24491 critical
- CVE-2022-23268 high
- CVE-2022-26821 high
- CVE-2022-24549 critical
- CVE-2022-26818 high
- CVE-2022-24543 critical
- CVE-2022-21983 critical
- CVE-2022-24537 critical
- CVE-2022-26915 critical
- CVE-2022-26829 high
- CVE-2022-22008 critical
- CVE-2022-24534 critical
- CVE-2022-24499 critical
- CVE-2022-26831 critical
- CVE-2022-24542 critical
- CVE-2022-24528 critical
- CVE-2022-26828 high
- CVE-2022-26810 critical
- CVE-2022-24487 critical
- CVE-2022-26792 critical
- CVE-2022-26830 critical
- CVE-2022-26786 critical
- CVE-2022-24490 critical
- CVE-2022-26918 critical
- CVE-2022-24488 critical
- CVE-2022-26815 high
- CVE-2022-24494 critical
- CVE-2022-24483 high
- CVE-2022-24484 high
- CVE-2022-26814 high
- CVE-2022-24532 critical
- CVE-2022-26904 high
- CVE-2022-26819 high
- CVE-2022-26826 high
- CVE-2022-24492 critical
- CVE-2022-22009 critical
- CVE-2022-26809 critical
- CVE-2022-26919 critical
- CVE-2022-26808 high
- CVE-2022-24493 high
- CVE-2022-24496 critical
- CVE-2022-26785 high
- CVE-2022-26798 critical
- CVE-2022-26807 high
- CVE-2022-26783 high
- CVE-2022-26824 high
- CVE-2022-24530 critical
- CVE-2022-26787 critical
- CVE-2022-26817 high
- CVE-2022-26797 critical
- CVE-2022-24481 critical
- CVE-2022-24474 critical
- CVE-2022-24546 critical
- CVE-2022-24486 critical
- CVE-2022-26827 high
- CVE-2022-24547 critical
- CVE-2022-24544 critical
- CVE-2022-26823 high
- CVE-2022-24540 high
- CVE-2022-24495 high
- CVE-2022-26816 high
- CVE-2022-26790 critical
- CVE-2022-26914 critical
- CVE-2022-24550 critical
- CVE-2022-26794 critical
- CVE-2022-26811 high
- CVE-2022-26820 high
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!