CVE-2022-44674 – Windows Bluetooth Driver Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2022-44674
Windows Bluetooth Driver Information Disclosure Vulnerability Vulnerabilidad de divulgación de información de Windows Bluetooth Driver • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44674 •
CVE-2022-44679 – Windows Graphics Component Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2022-44679
Windows Graphics Component Information Disclosure Vulnerability Vulnerabilidad de divulgación de información de Windows Graphics Component • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44679 •
CVE-2022-41045 – Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-41045
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en el Windows Advanced Local Procedure Call (ALPC) • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41045 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2022-41090 – Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2022-41090
Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability Vulnerabilidad de denegación de servicio del protocolo de túnel Point-to-Point de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41090 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2022-41052 – Windows Graphics Component Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-41052
Windows Graphics Component Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en el Windows Graphics Component This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Raw Image Extension. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CR2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41052 •