CVE-2022-30141 – Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-30141
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota en Windows Lightweight Directory Access Protocol (LDAP). Este ID de CVE es diferente de CVE-2022-30139, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30141 •
CVE-2022-30140 – Windows iSCSI Discovery Service Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-30140
Windows iSCSI Discovery Service Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota en Windows iSCSI Discovery Service • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30140 •
CVE-2022-30135 – Windows Media Center Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-30135
Windows Media Center Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Windows Media Center • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30135 •
CVE-2022-22025 – Windows Internet Information Services Cachuri Module Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2022-22025
Windows Internet Information Services Cachuri Module Denial of Service Vulnerability Una Vulnerabilidad de Denegación de Servicio en Windows Internet Information Services Cachuri Module • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22025 •
CVE-2022-30190 – Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-30190
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability. Una vulnerabilidad de Ejecución de Código Remota en Microsoft Windows Support Diagnostic Tool (MSDT) A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run code with the privileges of the calling application. • https://github.com/onecloudemoji/CVE-2022-30190 https://github.com/JMousqueton/PoC-CVE-2022-30190 https://github.com/komomon/CVE-2022-30190-follina-Office-MSDT-Fixed https://github.com/doocop/CVE-2022-30190 https://github.com/aminetitrofine/CVE-2022-30190 https://github.com/drgreenthumb93/CVE-2022-30190-follina https://github.com/DerZiad/CVE-2022-30190 https://github.com/sudoaza/CVE-2022-30190 https://github.com/arozx/CVE-2022-30190 https://github.com/winstxnhdw/CVE-2022-3019 • CWE-610: Externally Controlled Reference to a Resource in Another Sphere •