2023-05-31
|
CVE-2022-35751
|
Windows Hyper-V Elevation of Privilege Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_20h2, Windows_10_21h2, Windows_11_21h2, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_20h2
|
N/A
|
|
|
2023-05-31
|
CVE-2022-35752
|
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_20h2, Windows_10_21h1, Windows_11_21h2, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_20h2
|
N/A
|
|
|
2023-05-31
|
CVE-2022-35753
|
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_20h2, Windows_10_21h1, Windows_11_21h2, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_20h2
|
N/A
|
|
|
2023-05-31
|
CVE-2022-35755
|
Windows Print Spooler Elevation of Privilege Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_20h2, Windows_10_21h1, Windows_11_21h2, Windows_8\.1, Windows_rt_8\.1, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_20h2
|
N/A
|
|
|
2023-05-31
|
CVE-2022-35756
|
Windows Kerberos Elevation of Privilege Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_20h2, Windows_10_21h1, Windows_11_21h2, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_20h2
|
N/A
|
|
|
2023-05-31
|
CVE-2022-35757
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
|
Windows_10_1809, Windows_10_20h2, Windows_10_21h1, Windows_10_21h2, Windows_11_21h2, Windows_server_2019, Windows_server_2022, Windows_server_20h2
|
N/A
|
|
|
2023-05-31
|
CVE-2022-35758
|
Windows Kernel Memory Information Disclosure Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_20h2, Windows_10_21h1, Windows_11_21h2, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_20h2
|
N/A
|
|
|
2023-05-31
|
CVE-2022-35759
|
Windows Local Security Authority (LSA) Denial of Service Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_20h2, Windows_10_21h1, Windows_11_21h2, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_20h2
|
N/A
|
|
|
2023-12-20
|
CVE-2022-44684
|
Windows Local Session Manager (LSM) Denial of Service Vulnerability
|
Windows_10_20h2, Windows_10_21h1, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_server_2022
|
N/A
|
|
|
2013-12-11
|
CVE-2013-3900
|
Why is Microsoft republishing a CVE from 2013?
We are republishing CVE-2013-3900 in the Security Update Guide to update the Security Updates table and to inform customers that the EnableCertPaddingCheck is available in all currently supported versions of Windows 10 and Windows 11. While the format is different from the original CVE published in 2013, the information herein remains unchanged from the original text published on December 10, 2013.
Microsoft does not plan to enforce the stricter...
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_1909, Windows_10_20h2, Windows_10_21h1, Windows_10_21h2, Windows_11_21h2, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022
|
8.8
|
|
|