Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2022-24482 |
Windows ALPC Elevation of Privilege Vulnerability Published: April 15, 2022; 3:15:10 PM -0400 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0: 4.4 MEDIUM |
CVE-2022-24481 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability Published: April 15, 2022; 3:15:10 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2022-24479 |
Connected User Experiences and Telemetry Elevation of Privilege Vulnerability Published: April 15, 2022; 3:15:10 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2022-24474 |
Windows Win32k Elevation of Privilege Vulnerability Published: April 15, 2022; 3:15:09 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2022-23257 |
Windows Hyper-V Remote Code Execution Vulnerability Published: April 15, 2022; 3:15:09 PM -0400 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2022-21983 |
Win32 Stream Enumeration Remote Code Execution Vulnerability Published: April 15, 2022; 3:15:09 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0: 5.1 MEDIUM |
CVE-2022-24525 |
Windows Update Stack Elevation of Privilege Vulnerability Published: March 09, 2022; 12:15:16 PM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0: 4.4 MEDIUM |
CVE-2022-24508 |
Win32 File Enumeration Remote Code Execution Vulnerability Published: March 09, 2022; 12:15:15 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0: 6.5 MEDIUM |
CVE-2022-24507 |
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Published: March 09, 2022; 12:15:15 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2022-24505 |
Windows ALPC Elevation of Privilege Vulnerability Published: March 09, 2022; 12:15:15 PM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0: 4.4 MEDIUM |
CVE-2022-24503 |
Remote Desktop Protocol Client Information Disclosure Vulnerability Published: March 09, 2022; 12:15:15 PM -0500 |
V4.0:(not available) V3.1: 5.4 MEDIUM V2.0: 5.0 MEDIUM |
CVE-2022-24502 |
Windows HTML Platforms Security Feature Bypass Vulnerability Published: March 09, 2022; 12:15:14 PM -0500 |
V4.0:(not available) V3.1: 4.3 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2022-24460 |
Tablet Windows User Interface Application Elevation of Privilege Vulnerability Published: March 09, 2022; 12:15:13 PM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0: 7.6 HIGH |
CVE-2022-24459 |
Windows Fax and Scan Service Elevation of Privilege Vulnerability Published: March 09, 2022; 12:15:13 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2022-24454 |
Windows Security Support Provider Interface Elevation of Privilege Vulnerability Published: March 09, 2022; 12:15:13 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2022-23299 |
Windows PDEV Elevation of Privilege Vulnerability Published: March 09, 2022; 12:15:12 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2022-23298 |
Windows NT OS Kernel Elevation of Privilege Vulnerability Published: March 09, 2022; 12:15:12 PM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0: 6.9 MEDIUM |
CVE-2022-23297 |
Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability Published: March 09, 2022; 12:15:12 PM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2022-23296 |
Windows Installer Elevation of Privilege Vulnerability Published: March 09, 2022; 12:15:12 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2022-23294 |
Windows Event Tracing Remote Code Execution Vulnerability Published: March 09, 2022; 12:15:12 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0: 6.5 MEDIUM |