Msrc Windows 7 vulnerabilities
1,628 known vulnerabilities affecting msrc/windows_7.
Total CVEs
1,628
CISA KEV
72
actively exploited
Public exploits
162
Exploited in wild
82
Severity breakdown
CRITICAL24HIGH1098MEDIUM487LOW19
Vulnerabilities
Page 13 of 82
CVE-2022-29103HIGHCVSS 7.82022-05-10
CVE-2022-29103 [HIGH] Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Ref
msrc
CVE-2022-21972HIGHCVSS 8.12022-05-10
CVE-2022-21972 [HIGH] Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially craft
msrc
CVE-2022-23270HIGHCVSS 8.12022-05-10
CVE-2022-23270 [HIGH] Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially craft
msrc
CVE-2022-22013HIGHCVSS 8.82022-05-10
CVE-2022-22013 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows LDAP - Lightweight Directory Access Protocol: Windows LDAP - Lightweight Directory Access Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older S
msrc
CVE-2022-26925HIGHCVSS 8.1KEV2022-05-10
CVE-2022-26925 [HIGH] Windows LSA Spoofing Vulnerability
Windows LSA Spoofing Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could call a method on the LSARPC interface and coerce the domain controller to authenticate to the attacker using NTLM. This security update detects anonymous connection attempts in LSARPC and disallows it.
Is there more information available on how to protect my system?
Yes. Please see ADV210003 Mitigating NTLM Relay Att
msrc
CVE-2022-29128HIGHCVSS 8.82022-05-10
CVE-2022-29128 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
This vulnerability could be exploited over the network by an authenticated attacker through a low complexity attack on a server configured as the domain controller.
Windows LDAP - Lightweight Directory Access Protocol: Windows LDAP - Lightweig
msrc
CVE-2022-29137HIGHCVSS 8.82022-05-10
CVE-2022-29137 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows LDAP - Lightweight Directory Access Protocol: Windows LDAP - Lightweight Directory Access Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older S
msrc
CVE-2022-26935MEDIUMCVSS 6.52022-05-10
CVE-2022-26935 [MEDIUM] Windows WLAN AutoConfig Service Information Disclosure Vulnerability
Windows WLAN AutoConfig Service Information Disclosure Vulnerability
FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?
This vulnerability's attack is limited at the protocol level to a logically adjacent topology. This means it cannot simply be done across the internet, but instead needs something specific tied to the target. Good exampl
msrc
CVE-2022-29121MEDIUMCVSS 6.52022-05-10
CVE-2022-29121 [MEDIUM] Windows WLAN AutoConfig Service Denial of Service Vulnerability
Windows WLAN AutoConfig Service Denial of Service Vulnerability
FAQ: According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?
This vulnerability's attack is limited at the protocol level to a logically adjacent topology. This means it cannot simply be done across the internet, but instead needs something specific tied to the target. Good examples would i
msrc
CVE-2022-29127MEDIUMCVSS 4.22022-05-10
CVE-2022-29127 [MEDIUM] BitLocker Security Feature Bypass Vulnerability
BitLocker Security Feature Bypass Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
A successful attacker could bypass the BitLocker Device Encryption fe
msrc
CVE-2022-29112MEDIUMCVSS 6.52022-05-10
CVE-2022-29112 [MEDIUM] Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability require
msrc
CVE-2022-22015MEDIUMCVSS 6.52022-05-10
CVE-2022-22015 [MEDIUM] Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
Windows Remote Desktop: Windows Remote Desktop
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Ex
msrc
CVE-2022-26936MEDIUMCVSS 6.52022-05-10
CVE-2022-26936 [MEDIUM] Windows Server Service Information Disclosure Vulnerability
Windows Server Service Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The presence of specific file names and users can be confirmed over the internal network.
FAQ: What is the Windows Server Service?
The Windows Server Service is frequently referred to as LanmanServer, and is responsible for making printer and file sharing possible within a Windows
msrc
CVE-2022-26934MEDIUMCVSS 6.52022-05-10
CVE-2022-26934 [MEDIUM] Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability require
msrc
CVE-2022-22011MEDIUMCVSS 5.52022-05-10
CVE-2022-22011 [MEDIUM] Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Stat
msrc
CVE-2022-26809CRITICALCVSS 9.82022-04-12
CVE-2022-26809 [CRITICAL] Remote Procedure Call Runtime Remote Code Execution Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
To exploit this vulnerability, an unauthenticated attacker would need to send a specially crafted RPC call to an RPC host. This could result in remote code execution on the server side with the same permissions as the RPC service.
FAQ: Why did Microsoft remove the Mitigation to “Block
msrc
CVE-2022-24492HIGHCVSS 8.82022-04-12
CVE-2022-24492 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
FAQ: How could an attacker exploit the vulnerability?
To exploit this vulnerability, an attacker would need to trick a user into executing a specially crafted script which executes an RPC call to an RPC host. This could result in remote code execution on the server side with the same permissions as the RPC service.
Windows Remote Procedure Ca
msrc
CVE-2022-21983HIGHCVSS 7.52022-04-12
CVE-2022-21983 [HIGH] Win32 Stream Enumeration Remote Code Execution Vulnerability
Win32 Stream Enumeration Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interacti
msrc
CVE-2022-24530HIGHCVSS 7.82022-04-12
CVE-2022-24530 [HIGH] Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5012647
Reference: htt
msrc
CVE-2022-26918HIGHCVSS 7.82022-04-12
CVE-2022-26918 [HIGH] Windows Fax Compose Form Remote Code Execution Vulnerability
Windows Fax Compose Form Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.
For example, when the s
msrc