Msrc Windows 7 vulnerabilities
1,628 known vulnerabilities affecting msrc/windows_7.
Total CVEs
1,628
CISA KEV
72
actively exploited
Public exploits
162
Exploited in wild
82
Severity breakdown
CRITICAL24HIGH1098MEDIUM487LOW19
Vulnerabilities
Page 6 of 82
CVE-2022-30198HIGHCVSS 8.12022-10-11
CVE-2022-30198 [HIGH] Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit the vulnerability?
To exploit this vulnerability, an attacker would need to
msrc
CVE-2022-38000HIGHCVSS 8.12022-10-11
CVE-2022-38000 [HIGH] Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit the vulnerability?
To exploit this vulnerability, an attacker would need to
msrc
CVE-2022-37994HIGHCVSS 7.82022-10-11
CVE-2022-37994 [HIGH] Windows Group Policy Preference Client Elevation of Privilege Vulnerability
Windows Group Policy Preference Client Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Group Policy Preference Client: Windows Group Policy Preference Client
Microsoft: Microsoft
Customer Action Required: Yes
Impa
msrc
CVE-2022-38051HIGHCVSS 7.82022-10-11
CVE-2022-38051 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status:
msrc
CVE-2022-24504HIGHCVSS 8.12022-10-11
CVE-2022-24504 [HIGH] Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
FAQ: How could an attacker exploit the vulnerability?
To exploit this vulnerability, an attacker would need to send a specially crafted malicious PPTP packet to a PPTP server. This could result in remote code execution on the server side.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What doe
msrc
CVE-2022-37987HIGHCVSS 7.82022-10-11
CVE-2022-37987 [HIGH] Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Client Server Run-time Subsystem (CSRSS): Client Server Run-time Subsystem (CSRSS)
Microsoft: Microsoft
Customer Ac
msrc
CVE-2022-38040HIGHCVSS 8.82022-10-11
CVE-2022-38040 [HIGH] Microsoft ODBC Driver Remote Code Execution Vulnerability
Microsoft ODBC Driver Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.
Windows ODBC Driver:
msrc
CVE-2022-37981MEDIUMCVSS 4.32022-10-11
CVE-2022-37981 [MEDIUM] Windows Event Logging Service Denial of Service Vulnerability
Windows Event Logging Service Denial of Service Vulnerability
FAQ: According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of availability (A:L)? What does that mean for this vulnerability?
The performance can be interrupted and/or reduced, but the attacker cannot fully deny service.
Windows Event Logging Service: Windows Event Logging Service
Microsoft: Microsoft
msrc
CVE-2022-37985MEDIUMCVSS 5.52022-10-11
CVE-2022-37985 [MEDIUM] Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Stat
msrc
CVE-2022-38043MEDIUMCVSS 5.52022-10-11
CVE-2022-38043 [MEDIUM] Windows Security Support Provider Interface Information Disclosure Vulnerability
Windows Security Support Provider Interface Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain kernel memory content.
FAQ: How the attacker exploit this vulnerability?
A locally authenticated attacker can create a specially crafted request which crashes the client on
msrc
CVE-2022-37977MEDIUMCVSS 6.52022-10-11
CVE-2022-37977 [MEDIUM] Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
Windows Local Security Authority Subsystem Service (LSASS): Windows Local Security Authority Subsystem Service (LSASS)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Sof
msrc
CVE-2022-38033MEDIUMCVSS 6.52022-10-11
CVE-2022-38033 [MEDIUM] Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability
Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploits this vulnerability would be able to remotely read registry keys under HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedExactPaths\Machine not normally accessible to a norma
msrc
CVE-2022-38032MEDIUMCVSS 6.62022-10-11
CVE-2022-38032 [MEDIUM] Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability
Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An authenticated attacker who successfully exploited this vulnerability could bypass "Deny Read/Write USB devices" Group Policy settings and access USB devices attached to a vulnerable system.
Windows Portable De
msrc
CVE-2022-38026MEDIUMCVSS 5.52022-10-11
CVE-2022-38026 [MEDIUM] Windows DHCP Client Information Disclosure Vulnerability
Windows DHCP Client Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited the vulnerability could potentially read User Mode Service Memory.
Windows DHCP Client: Windows DHCP Client
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:No;Late
msrc
CVE-2022-35770MEDIUMCVSS 6.52022-10-11
CVE-2022-35770 [MEDIUM] Windows NTLM Spoofing Vulnerability
Windows NTLM Spoofing Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
The user would have to access a malicious folder or directory. Users should never open anything that they do not know or trust to be safe.
Windows NTLM: Windows NTLM
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Spoofing
Exploit Status: Publicly Disclosed:No;Exploited:
msrc
CVE-2022-38022LOWCVSS 3.32022-10-11
CVE-2022-38022 [LOW] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker would only be able to delete empty folders on a vulnerable system in the context of the SYSTEM account. They would not gain privileges to view or modify file contents or delete folders containing files.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Custom
msrc
CVE-2022-34721CRITICALCVSS 9.8Exploited2022-09-13
CVE-2022-34721 [CRITICAL] Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted IP packet to a target machine that is running Windows and has IPSec enabled, which could enable a remote code execution exploitation.
FAQ: Does this vulnerability affect all
msrc
CVE-2022-34722CRITICALCVSS 9.82022-09-13
CVE-2022-34722 [CRITICAL] Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted IP packet to a target machine that is running Windows and has IPSec enabled, which could enable a remote code execution exploitation.
FAQ: Does this vulnerability affect all
msrc
CVE-2022-34718CRITICALCVSS 9.82022-09-13
CVE-2022-34718 [CRITICAL] Windows TCP/IP Remote Code Execution Vulnerability
Windows TCP/IP Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted IPv6 packet to a Windows node where IPSec is enabled, which could enable a remote code execution exploitation on that machine.
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Statu
msrc
CVE-2022-35803HIGHCVSS 7.8Exploited2022-09-13
CVE-2022-35803 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact:
msrc