Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, bypass security restrictions, gain privileges, cause denial of service, spoof user interface.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Windows LDAP can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Server Service can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows Fax Service can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows Network File System can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Remote Desktop Protocol (RDP) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Address Book can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Point-to-Point Tunneling Protocol can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows WLAN AutoConfig Service can be exploited remotely to cause denial of service.
- A spoofing vulnerability in Windows LSA can be exploited remotely to to spoof user interface.
- A remote code execution vulnerability in Microsoft Windows Media Foundation can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows WLAN AutoConfig Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Print Spooler can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Hyper-V Shared Virtual Disk can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Failover Cluster can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Cluster Shared Volume (CSV) can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Clustered Shared Volume can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows Graphics Component can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Digital Media Receiver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows ALPC can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Push Notifications Apps can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Clustered Shared Volume can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows NTFS can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Hyper-V can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Remote Desktop Protocol Client can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Authentication can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Storage Spaces Direct can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows PlayToManager can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Active Directory Domain Services can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Clustered Shared Volume can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Tablet Windows User Interface Application Core can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to gain privileges.
Первичный источник обнаружения
- CVE-2022-29137
CVE-2022-29140
CVE-2022-29106
CVE-2022-29127
CVE-2022-22019
CVE-2022-22017
CVE-2022-29104
CVE-2022-29102
CVE-2022-29151
CVE-2022-29129
CVE-2022-29122
CVE-2022-29150
CVE-2022-29132
CVE-2022-29130
CVE-2022-26927
CVE-2022-26925
CVE-2022-29105
CVE-2022-29113
CVE-2022-22011
CVE-2022-29128
CVE-2022-23279
CVE-2022-22014
CVE-2022-29133
CVE-2022-29131
CVE-2022-26936
CVE-2022-29115
CVE-2022-22012
CVE-2022-26931
CVE-2022-22013
CVE-2022-29125
CVE-2022-29139
CVE-2022-29141
CVE-2022-22713
CVE-2022-29138
CVE-2022-29112
CVE-2022-29103
CVE-2022-26937
CVE-2022-22015
CVE-2022-26933
CVE-2022-29135
CVE-2022-24466
CVE-2022-26940
CVE-2022-29134
CVE-2022-26913
CVE-2022-26938
CVE-2022-26926
CVE-2022-22016
CVE-2022-23270
CVE-2022-29142
CVE-2022-29121
CVE-2022-21972
CVE-2022-26923
CVE-2022-26930
CVE-2022-29123
CVE-2022-29120
CVE-2022-26935
CVE-2022-29126
CVE-2022-29114
CVE-2022-29116
CVE-2022-26934
CVE-2022-26932
CVE-2022-26939
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
Список CVE
- CVE-2022-29137 high
- CVE-2022-26936 warning
- CVE-2022-29115 high
- CVE-2022-29127 warning
- CVE-2022-22012 critical
- CVE-2022-26931 high
- CVE-2022-22013 high
- CVE-2022-22019 high
- CVE-2022-29139 high
- CVE-2022-29129 critical
- CVE-2022-29141 high
- CVE-2022-29112 warning
- CVE-2022-26937 critical
- CVE-2022-29103 warning
- CVE-2022-22015 warning
- CVE-2022-29132 high
- CVE-2022-29130 critical
- CVE-2022-26926 high
- CVE-2022-23270 critical
- CVE-2022-29121 warning
- CVE-2022-21972 critical
- CVE-2022-26925 warning
- CVE-2022-29105 high
- CVE-2022-22011 warning
- CVE-2022-26935 warning
- CVE-2022-29128 critical
- CVE-2022-26934 warning
- CVE-2022-22014 high
- CVE-2022-29140 warning
- CVE-2022-29106 warning
- CVE-2022-22017 critical
- CVE-2022-29104 warning
- CVE-2022-29102 warning
- CVE-2022-29151 high
- CVE-2022-29122 warning
- CVE-2022-29150 high
- CVE-2022-26927 high
- CVE-2022-29113 warning
- CVE-2022-23279 warning
- CVE-2022-29133 high
- CVE-2022-29131 critical
- CVE-2022-29125 warning
- CVE-2022-22713 warning
- CVE-2022-29138 high
- CVE-2022-26933 warning
- CVE-2022-29135 high
- CVE-2022-24466 warning
- CVE-2022-26940 warning
- CVE-2022-29134 warning
- CVE-2022-26913 high
- CVE-2022-26938 warning
- CVE-2022-22016 warning
- CVE-2022-29142 high
- CVE-2022-26923 critical
- CVE-2022-26930 warning
- CVE-2022-29123 warning
- CVE-2022-29120 warning
- CVE-2022-29126 high
- CVE-2022-29114 warning
- CVE-2022-29116 warning
- CVE-2022-26932 high
- CVE-2022-26939 warning
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!