Total
3199 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-22029 | 1 Microsoft | 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more | 2023-12-10 | 6.8 MEDIUM | 8.1 HIGH |
Windows Network File System Remote Code Execution Vulnerability | |||||
CVE-2022-22050 | 1 Microsoft | 10 Windows 10, Windows 11, Windows 7 and 7 more | 2023-12-10 | 7.2 HIGH | 7.8 HIGH |
Windows Fax Service Elevation of Privilege Vulnerability | |||||
CVE-2022-41118 | 1 Microsoft | 9 Windows 10, Windows 11, Windows 7 and 6 more | 2023-12-10 | N/A | 7.5 HIGH |
Windows Scripting Languages Remote Code Execution Vulnerability | |||||
CVE-2022-34726 | 1 Microsoft | 10 Windows 10, Windows 11, Windows 7 and 7 more | 2023-12-10 | N/A | 8.8 HIGH |
Microsoft ODBC Driver Remote Code Execution Vulnerability | |||||
CVE-2022-41045 | 1 Microsoft | 10 Windows 10, Windows 11, Windows 7 and 7 more | 2023-12-10 | N/A | 7.8 HIGH |
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability | |||||
CVE-2022-22045 | 1 Microsoft | 5 Windows 10, Windows 11, Windows Server 2016 and 2 more | 2023-12-10 | 6.9 MEDIUM | 7.8 HIGH |
Windows.Devices.Picker.dll Elevation of Privilege Vulnerability | |||||
CVE-2022-30133 | 1 Microsoft | 9 Windows 10, Windows 11, Windows 7 and 6 more | 2023-12-10 | N/A | 9.8 CRITICAL |
Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability | |||||
CVE-2022-34733 | 1 Microsoft | 10 Windows 10, Windows 11, Windows 7 and 7 more | 2023-12-10 | N/A | 8.8 HIGH |
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | |||||
CVE-2022-30209 | 1 Microsoft | 10 Windows 10, Windows 11, Windows 7 and 7 more | 2023-12-10 | 5.8 MEDIUM | 7.4 HIGH |
Windows IIS Server Elevation of Privilege Vulnerability | |||||
CVE-2022-30220 | 1 Microsoft | 10 Windows 10, Windows 11, Windows 7 and 7 more | 2023-12-10 | 7.2 HIGH | 7.8 HIGH |
Windows Common Log File System Driver Elevation of Privilege Vulnerability | |||||
CVE-2022-37967 | 4 Fedoraproject, Microsoft, Netapp and 1 more | 9 Fedora, Windows Server 2008, Windows Server 2012 and 6 more | 2023-12-10 | N/A | 7.2 HIGH |
Windows Kerberos Elevation of Privilege Vulnerability | |||||
CVE-2022-34728 | 1 Microsoft | 10 Windows 10, Windows 11, Windows 7 and 7 more | 2023-12-10 | N/A | 5.5 MEDIUM |
Windows Graphics Component Information Disclosure Vulnerability | |||||
CVE-2022-41101 | 1 Microsoft | 5 Windows 10, Windows 11, Windows Server 2016 and 2 more | 2023-12-10 | N/A | 7.8 HIGH |
Windows Overlay Filter Elevation of Privilege Vulnerability | |||||
CVE-2022-41052 | 1 Microsoft | 5 Windows 10, Windows 11, Windows Server 2016 and 2 more | 2023-12-10 | N/A | 7.8 HIGH |
Windows Graphics Component Remote Code Execution Vulnerability | |||||
CVE-2022-41109 | 1 Microsoft | 9 Windows 10, Windows 11, Windows 7 and 6 more | 2023-12-10 | N/A | 7.8 HIGH |
Windows Win32k Elevation of Privilege Vulnerability | |||||
CVE-2022-35841 | 1 Microsoft | 5 Windows 10, Windows 11, Windows Server 2016 and 2 more | 2023-12-10 | N/A | 8.8 HIGH |
Windows Enterprise App Management Service Remote Code Execution Vulnerability | |||||
CVE-2022-30222 | 1 Microsoft | 5 Windows 10, Windows 11, Windows Server 2016 and 2 more | 2023-12-10 | 4.6 MEDIUM | 8.4 HIGH |
Windows Shell Remote Code Execution Vulnerability | |||||
CVE-2022-22028 | 1 Microsoft | 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more | 2023-12-10 | 4.3 MEDIUM | 5.9 MEDIUM |
Windows Network File System Information Disclosure Vulnerability | |||||
CVE-2022-34704 | 1 Microsoft | 5 Windows 10, Windows 11, Windows Server 2016 and 2 more | 2023-12-10 | N/A | 4.7 MEDIUM |
Windows Defender Credential Guard Information Disclosure Vulnerability | |||||
CVE-2022-34302 | 3 Horizondatasys, Microsoft, Redhat | 10 Uefi Bootloader, Windows 10, Windows 11 and 7 more | 2023-12-10 | N/A | 6.7 MEDIUM |
A flaw was found in New Horizon Datasys bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media. |