CVE-2022-21898 – DirectX Graphics Kernel Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-21898
DirectX Graphics Kernel Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota en DirectX Graphics Kernel. Este ID de CVE es diferente de CVE-2022-21912 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21898 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21898 •
CVE-2022-21897 – Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-21897
Windows Common Log File System Driver Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Windows Common Log File System Driver. Este ID de CVE es diferente de CVE-2022-21916 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21897 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21897 •
CVE-2022-21896 – Windows DWM Core Library Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-21896
Windows DWM Core Library Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Windows DWM Core Library. Este ID de CVE es diferente de CVE-2022-21852, CVE-2022-21902 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21896 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21896 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2022-21895 – Windows User Profile Service Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2022-21895
Windows User Profile Service Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Windows User Profile Service. Este ID de CVE es diferente de CVE-2022-21919 This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the User Profile Service. By creating a directory junction, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21895 https://www.zerodayinitiative.com/advisories/ZDI-22-050 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21895 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2022-21894 – Secure Boot Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2022-21894
Secure Boot Security Feature Bypass Vulnerability Una vulnerabilidad de Omisión de la Funcionalidad de Seguridad de Secure Boot • https://github.com/Wack0/CVE-2022-21894 https://github.com/ASkyeye/CVE-2022-21894-Payload https://github.com/nova-master/CVE-2022-21894-Payload-New https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21894 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21894 • CWE-863: Incorrect Authorization •