CVE-2022-41101 – Windows Overlay Filter Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-41101
Windows Overlay Filter Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del filtro de superposición de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41101 •
CVE-2022-37992 – Windows Group Policy Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-37992
Windows Group Policy Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en la política de grupo de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37992 •
CVE-2022-41096 – Microsoft DWM Core Library Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-41096
Microsoft DWM Core Library Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de la librería Microsoft DWM Core • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41096 •
CVE-2022-41100 – Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-41100
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en el Windows Advanced Local Procedure Call (ALPC) • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41100 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2022-41092 – Windows Win32k Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-41092
Windows Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Windows Win32k This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Output Protection Manager. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41092 •