cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-44684,https://securityvulnerability.io/vulnerability/CVE-2022-44684,Windows Local Session Manager (LSM) Denial of Service Vulnerability,Windows Local Session Manager (LSM) Denial of Service Vulnerability,Microsoft,"Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2022, 23h2 Edition (server Core Installation)",6.5,MEDIUM,0.0005300000193528831,false,false,false,false,,false,false,2023-12-20T20:15:00.000Z,0 CVE-2022-35759,https://securityvulnerability.io/vulnerability/CVE-2022-35759,Windows Local Security Authority (LSA) Denial of Service Vulnerability,Windows Local Security Authority (LSA) Denial of Service Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",6.5,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:09.012Z,0 CVE-2022-35758,https://securityvulnerability.io/vulnerability/CVE-2022-35758,Windows Kernel Memory Information Disclosure Vulnerability,Windows Kernel Memory Information Disclosure Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",5.5,MEDIUM,0.0006200000061653554,false,false,false,false,,false,false,2023-05-31T18:07:08.480Z,0 CVE-2022-35757,https://securityvulnerability.io/vulnerability/CVE-2022-35757,Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability,"The Windows Cloud Files Mini Filter Driver contains a vulnerability that allows an attacker to elevate privileges on the affected system. This means that an attacker with limited access to the system could exploit this vulnerability to gain higher-level permissions, potentially leading to unauthorized actions and access to sensitive information. Organizations utilizing affected Windows versions should apply security patches and remain vigilant to safeguard against potential exploitation.",Microsoft,"Windows 10 Version 1809,Windows Server 2022,Windows 10 Version 21h1,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows Server Version 20h2,Windows Server 2019 (server Core Installation),Windows Server 2019",7.3,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:07.974Z,0 CVE-2022-35756,https://securityvulnerability.io/vulnerability/CVE-2022-35756,Windows Kerberos Elevation of Privilege Vulnerability,"A vulnerability in the Windows Kerberos authentication system could allow an attacker to elevate their privileges within a security context. By exploiting this flaw, unauthorized users may gain elevated access to sensitive resources or perform actions that require higher privileges than those assigned to them, which may lead to further system compromise. Organizations are advised to apply the necessary security updates promptly.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:07.466Z,0 CVE-2022-35755,https://securityvulnerability.io/vulnerability/CVE-2022-35755,Windows Print Spooler Elevation of Privilege Vulnerability,"This vulnerability allows an attacker with low privileges to elevate their access level within the Windows Print Spooler service. Exploiting this vulnerability could enable malicious actors to execute arbitrary code or gain higher-level access to the system, which poses a significant security risk. Users are advised to apply security updates promptly to mitigate any potential threats associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.3,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:06.943Z,0 CVE-2022-35754,https://securityvulnerability.io/vulnerability/CVE-2022-35754,Unified Write Filter Elevation of Privilege Vulnerability,Unified Write Filter Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows 10 Version 21h1,Windows 11 Version 21h2,Windows Server Version 20h2,Windows 10 Version 1507,Windows Server 2016 (server Core Installation),Windows Server 2019 (server Core Installation),Windows 10 Version 20h2,Windows Server 2019,Windows 10 Version 1607,Windows 8.1,Windows 10 Version 21h2,Windows Server 2016,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2 (server Core Installation),Windows Server 2012 R2",6.7,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:06.372Z,0 CVE-2022-35753,https://securityvulnerability.io/vulnerability/CVE-2022-35753,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-05-31T18:07:05.840Z,0 CVE-2022-35752,https://securityvulnerability.io/vulnerability/CVE-2022-35752,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,"The Windows Secure Socket Tunneling Protocol (SSTP) is susceptible to a remote code execution vulnerability that may allow an attacker to execute arbitrary code on the affected system if they successfully exploit the vulnerability. Successful exploitation could enable attackers to gain control over the affected system, leading to unauthorized access or further compromise of the security. Users are advised to apply security updates and follow best practices to mitigate potential risks.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-05-31T18:07:05.297Z,0 CVE-2022-35751,https://securityvulnerability.io/vulnerability/CVE-2022-35751,Windows Hyper-V Elevation of Privilege Vulnerability,"The Windows Hyper-V elevation of privilege vulnerability allows attackers to gain elevated permissions on affected systems, potentially compromising sensitive resources. This issue arises from the incorrect handling of objects in memory, leading to unintended access to privileged operations. Users are encouraged to apply the latest patches from Microsoft to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004900000058114529,false,false,false,false,,false,false,2023-05-31T18:07:04.776Z,0 CVE-2022-35750,https://securityvulnerability.io/vulnerability/CVE-2022-35750,Win32k Elevation of Privilege Vulnerability,"The Win32k Elevation of Privilege vulnerability allows an attacker to execute arbitrary code with elevated privileges on affected Microsoft Windows systems. By exploiting this flaw, an unauthorized user can gain access and control over system processes, potentially leading to widespread system compromise. This vulnerability is particularly critical as it can be triggered by an application running on the affected system. Microsoft has released guidance on mitigating this risk to help users protect their environments.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004900000058114529,false,false,false,false,,false,false,2023-05-31T18:07:04.236Z,0 CVE-2022-35749,https://securityvulnerability.io/vulnerability/CVE-2022-35749,Windows Digital Media Receiver Elevation of Privilege Vulnerability,"The Windows Digital Media Receiver has a vulnerability that allows an attacker with access to the device to elevate privileges, potentially enabling unauthorized actions. This flaw can be exploited to gain higher permissions, circumventing standard security measures. Users are advised to apply the appropriate updates to mitigate risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:03.722Z,0 CVE-2022-35747,https://securityvulnerability.io/vulnerability/CVE-2022-35747,Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability,Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",5.9,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:02.694Z,0 CVE-2022-35746,https://securityvulnerability.io/vulnerability/CVE-2022-35746,Windows Digital Media Receiver Elevation of Privilege Vulnerability,"A vulnerability exists in the Windows Digital Media Receiver that can allow an attacker to elevate their privileges within the system. This flaw can be exploited to gain higher-level permissions, providing unauthorized access to sensitive functions or data. Proper patching and monitoring are essential to mitigate risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:02.139Z,0 CVE-2022-35745,https://securityvulnerability.io/vulnerability/CVE-2022-35745,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-05-31T18:07:01.505Z,0 CVE-2022-35744,https://securityvulnerability.io/vulnerability/CVE-2022-35744,Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability,"The Windows Point-to-Point Protocol (PPP) features a vulnerability that could allow remote code execution. Attackers exploiting this issue could potentially gain unauthorized access to the system, enabling them to execute arbitrary code. This can lead to a variety of risks, including data breaches and system integrity issues. Organizations using Windows operating systems with PPP should apply necessary patches and updates to mitigate this risk.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",9.8,CRITICAL,0.00171999994199723,false,false,false,false,,false,false,2023-05-31T18:07:00.959Z,0 CVE-2022-35743,https://securityvulnerability.io/vulnerability/CVE-2022-35743,Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability,"The Microsoft Windows Support Diagnostic Tool (MSDT) has a security flaw that allows an attacker to execute arbitrary code on the victim's system without authorization. This vulnerability is initiated when a specially crafted file is processed by the MSDT. Successful exploitation can lead to complete system compromise, allowing attackers to install programs, view, change, or delete data, and create new accounts with full user rights. Users are advised to apply security updates to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2023-05-31T18:07:00.424Z,0 CVE-2023-21712,https://securityvulnerability.io/vulnerability/CVE-2023-21712,Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability,Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.001509999972768128,false,false,false,false,,false,false,2023-04-27T19:15:00.000Z,0 CVE-2022-44674,https://securityvulnerability.io/vulnerability/CVE-2022-44674,Windows Bluetooth Driver Information Disclosure Vulnerability,Windows Bluetooth Driver Information Disclosure Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2",5.5,MEDIUM,0.0006900000153109431,false,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-44671,https://securityvulnerability.io/vulnerability/CVE-2022-44671,Windows Graphics Component Elevation of Privilege Vulnerability,Windows Graphics Component Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2",7.8,HIGH,0.000699999975040555,false,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-44676,https://securityvulnerability.io/vulnerability/CVE-2022-44676,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.004339999984949827,false,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-44667,https://securityvulnerability.io/vulnerability/CVE-2022-44667,Windows Media Remote Code Execution Vulnerability,Windows Media Remote Code Execution Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.003930000122636557,false,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-44669,https://securityvulnerability.io/vulnerability/CVE-2022-44669,Windows Error Reporting Elevation of Privilege Vulnerability,Windows Error Reporting Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2",7,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-44670,https://securityvulnerability.io/vulnerability/CVE-2022-44670,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.004339999984949827,false,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-44677,https://securityvulnerability.io/vulnerability/CVE-2022-44677,Windows Projected File System Elevation of Privilege Vulnerability,Windows Projected File System Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2",7.8,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0