CVE-2022-37979 – Windows Hyper-V Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-37979
Windows Hyper-V Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Windows Hyper-V • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37979 •
CVE-2022-38042 – Active Directory Domain Services Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-38042
Active Directory Domain Services Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Active Directory Domain Services • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38042 •
CVE-2022-37999 – Windows Group Policy Preference Client Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-37999
Windows Group Policy Preference Client Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Windows Group Policy Preference Client. Este ID de CVE es diferente de CVE-2022-37993, CVE-2022-37994 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37999 •
CVE-2022-38032 – Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2022-38032
Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability Una Vulnerabilidad de Omisión de la Funcionalidades de Seguridad en Windows Portable Device Enumerator Service • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38032 •
CVE-2022-37986 – Windows Win32k Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-37986
Windows Win32k Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Windows Win32k This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute code at low integrity on the target system in order to exploit this vulnerability. The specific flaw exists within the user-mode print driver host process. The issue results from insufficient validation of the origin of commands. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the current user at medium integrity. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37986 •