Windows Graphics Component Remote Code Execution Vulnerability
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows 10 - |
||
microsoft windows 10 1607 |
||
microsoft windows server 2008 r2 |
||
microsoft windows 7 - |
||
microsoft windows server 2012 r2 |
||
microsoft windows server 2016 - |
||
microsoft windows server 2012 - |
||
microsoft windows 8.1 - |
||
microsoft windows server 2019 - |
||
microsoft windows 10 1809 |
||
microsoft windows server 2016 20h2 |
||
microsoft windows 10 20h2 |
||
microsoft windows 10 21h1 |
||
microsoft windows server 2022 - |
||
microsoft windows 11 - |
||
microsoft windows 10 21h2 |
Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources No, Windows Autopatch didn't kill the monthly patchapalooza Older AMD, Intel chips vulnerable to data-leaking 'Retbleed' Spectre variant
Patch Tuesday Despite worries that Patch Tuesday may not be as exciting now that Microsoft's Windows Autopatch is live — with a slew of caveats — the second Tuesday of this month arrived with 84 security fixes, including 4 critical bugs and one that's under active exploit. Let's start with the one that miscreants have already found and exploited. CVE-2022-22047 is an elevation of privilege vuln in Windows' Client Server Runtime Subsystem (CSRSS). Microsoft deemed it an "important" secu...