Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Total 21525 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-23764 2 Microsoft, Teruten 2 Windows, Webcube 2024-11-21 N/A 8.8 HIGH
The vulnerability causing from insufficient verification procedures for downloaded files during WebCube update. Remote attackers can bypass this verification logic to update both digitally signed and unauthorized files, enabling remote code execution.
CVE-2022-23763 2 Douzone, Microsoft 2 Neors, Windows 2024-11-21 6.8 MEDIUM 7.8 HIGH
Origin validation error vulnerability in NeoRS’s ActiveX moudle allows attackers to download and execute arbitrary files. Remote attackers can use this vulerability to encourage users to access crafted web pages, causing damage such as malicious code infections.
CVE-2022-23742 2 Checkpoint, Microsoft 2 Endpoint Security, Windows 2024-11-21 4.6 MEDIUM 7.8 HIGH
Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links.
CVE-2022-23714 2 Elastic, Microsoft 2 Endpoint Security, Windows 2024-11-21 7.2 HIGH 7.8 HIGH
A local privilege escalation (LPE) issue was discovered in the ransomware canaries features of Elastic Endpoint Security for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account.
CVE-2022-23678 2 Hp, Microsoft 2 Aruba Virtual Intranet Access, Windows 2024-11-21 N/A 5.9 MEDIUM
A vulnerability in the Aruba Virtual Intranet Access (VIA) client for Microsoft Windows operating system client communications that could allow for an attacker in a privileged network position to intercept sensitive information in Aruba Virtual Intranet Access (VIA) client for Microsoft Windows operating system versions: 4.3.0 build 2208101 and below. Aruba has released upgrades for Virtual Intranet Access (VIA) Client that address this security vulnerability.
CVE-2022-23551 1 Microsoft 1 Azure Ad Pod Identity 2024-11-21 N/A 5.3 MEDIUM
aad-pod-identity assigns Azure Active Directory identities to Kubernetes applications and has now been deprecated as of 24 October 2022. The NMI component in AAD Pod Identity intercepts and validates token requests based on regex. In this case, a token request made with backslash in the request (example: `/metadata/identity\oauth2\token/`) would bypass the NMI validation and be sent to IMDS allowing a pod in the cluster to access identities that it shouldn't have access to. This issue has been fixed and has been included in AAD Pod Identity release version 1.8.13. If using the AKS pod-managed identities add-on, no action is required. The clusters should now be running the version 1.8.13 release.
CVE-2022-23511 2 Amazon, Microsoft 2 Cloudwatch Agent, Windows 2024-11-21 N/A 7.1 HIGH
A privilege escalation issue exists within the Amazon CloudWatch Agent for Windows, software for collecting metrics and logs from Amazon EC2 instances and on-premises servers, in versions up to and including v1.247354. When users trigger a repair of the Agent, a pop-up window opens with SYSTEM permissions. Users with administrative access to affected hosts may use this to create a new command prompt as NT AUTHORITY\SYSTEM. To trigger this issue, the third party must be able to access the affected host and elevate their privileges such that they're able to trigger the agent repair process. They must also be able to install the tools required to trigger the issue. This issue does not affect the CloudWatch Agent for macOS or Linux. Agent users should upgrade to version 1.247355 of the CloudWatch Agent to address this issue. There is no recommended work around. Affected users must update the installed version of the CloudWatch Agent to address this issue.
CVE-2022-23301 1 Microsoft 1 Hevc Video Extensions 2024-11-21 6.8 MEDIUM 7.8 HIGH
HEVC Video Extensions Remote Code Execution Vulnerability
CVE-2022-23300 1 Microsoft 1 Raw Image Extension 2024-11-21 6.8 MEDIUM 7.8 HIGH
Raw Image Extension Remote Code Execution Vulnerability
CVE-2022-23299 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows PDEV Elevation of Privilege Vulnerability
CVE-2022-23298 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2024-11-21 6.9 MEDIUM 7.0 HIGH
Windows NT OS Kernel Elevation of Privilege Vulnerability
CVE-2022-23297 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2024-11-21 2.1 LOW 5.5 MEDIUM
Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability
CVE-2022-23296 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows Installer Elevation of Privilege Vulnerability
CVE-2022-23295 1 Microsoft 1 Raw Image Extension 2024-11-21 6.8 MEDIUM 7.8 HIGH
Raw Image Extension Remote Code Execution Vulnerability
CVE-2022-23294 1 Microsoft 8 Windows 10, Windows 11, Windows 8.1 and 5 more 2024-11-21 6.5 MEDIUM 8.8 HIGH
Windows Event Tracing Remote Code Execution Vulnerability
CVE-2022-23293 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows Fast FAT File System Driver Elevation of Privilege Vulnerability
CVE-2022-23292 1 Microsoft 1 On-premises Data Gateway 2024-11-21 3.6 LOW 3.7 LOW
Microsoft Power BI Spoofing Vulnerability
CVE-2022-23291 1 Microsoft 4 Windows 10, Windows 11, Windows Server and 1 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2022-23290 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows Inking COM Elevation of Privilege Vulnerability
CVE-2022-23288 1 Microsoft 3 Windows 10, Windows Server, Windows Server 2019 2024-11-21 6.9 MEDIUM 7.0 HIGH
Windows DWM Core Library Elevation of Privilege Vulnerability