Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:-:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2022-34707 |
Windows Kernel Elevation of Privilege Vulnerability Published: August 09, 2022; 4:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-34706 |
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability Published: August 09, 2022; 4:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-34702 |
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability Published: August 09, 2022; 4:15:10 PM -0400 |
V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2022-34701 |
Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability Published: August 09, 2022; 4:15:10 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-34691 |
Active Directory Domain Services Elevation of Privilege Vulnerability Published: August 09, 2022; 4:15:10 PM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2022-34690 |
Windows Fax Service Elevation of Privilege Vulnerability Published: August 09, 2022; 4:15:10 PM -0400 |
V3.1: 7.1 HIGH V2.0:(not available) |
CVE-2022-33670 |
Windows Partition Management Driver Elevation of Privilege Vulnerability Published: August 09, 2022; 4:15:10 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-30194 |
Windows WebBrowser Control Remote Code Execution Vulnerability Published: August 09, 2022; 4:15:09 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-30144 |
Windows Bluetooth Service Remote Code Execution Vulnerability Published: August 09, 2022; 4:15:09 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-30133 |
Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability Published: August 09, 2022; 4:15:09 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2022-22038 |
Remote Procedure Call Runtime Remote Code Execution Vulnerability Published: July 12, 2022; 7:15:09 PM -0400 |
V3.1: 8.1 HIGH V2.0: 6.8 MEDIUM |
CVE-2022-30166 |
Local Security Authority Subsystem Service Elevation of Privilege Vulnerability Published: June 15, 2022; 6:15:14 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2022-30164 |
Kerberos AppContainer Security Feature Bypass Vulnerability Published: June 15, 2022; 6:15:14 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2022-30162 |
Windows Kernel Information Disclosure Vulnerability Published: June 15, 2022; 6:15:14 PM -0400 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2022-30161 |
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability Published: June 15, 2022; 6:15:14 PM -0400 |
V3.1: 8.8 HIGH V2.0: 6.8 MEDIUM |
CVE-2022-30160 |
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability Published: June 15, 2022; 6:15:14 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2022-30147 |
Windows Installer Elevation of Privilege Vulnerability Published: June 15, 2022; 6:15:13 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2022-30142 |
Windows File History Remote Code Execution Vulnerability Published: June 15, 2022; 6:15:13 PM -0400 |
V3.1: 7.5 HIGH V2.0: 7.6 HIGH |
CVE-2022-30135 |
Windows Media Center Elevation of Privilege Vulnerability Published: June 15, 2022; 6:15:13 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2022-30190 |
<p>A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.</p> <p>Please see the <a href="https://aka.ms/CVE-2022-30190-Guidance">MSRC Blog Entry</a> for important information about steps you can take to protect your system from this vulnerability.</p> Published: June 01, 2022; 4:15:07 PM -0400 |
V3.1: 7.8 HIGH V2.0: 9.3 HIGH |