The remote Windows host is missing security update 5016684. It is, therefore, affected by multiple vulnerabilities
- Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)
- Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)
- Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
{"kaspersky": [{"lastseen": "2023-06-05T14:58:52", "description": "### *Detect date*:\n08/09/2022\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, execute arbitrary code, obtain sensitive information.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows 7 for x64-based Systems Service Pack 1 \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows 7 for 32-bit Systems Service Pack 1 \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows Server 2008 for x64-based Systems Service Pack 2\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2022-35759](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35759>) \n[CVE-2022-34690](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34690>) \n[CVE-2022-35745](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35745>) \n[CVE-2022-35750](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35750>) \n[CVE-2022-34708](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34708>) \n[CVE-2022-35753](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35753>) \n[CVE-2022-34691](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34691>) \n[CVE-2022-35751](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35751>) \n[CVE-2022-34701](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34701>) \n[CVE-2022-34707](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34707>) \n[CVE-2022-34713](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713>) \n[CVE-2022-35820](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35820>) \n[CVE-2022-30194](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30194>) \n[CVE-2022-35744](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35744>) \n[CVE-2022-34706](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34706>) \n[CVE-2022-34714](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34714>) \n[CVE-2022-30133](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30133>) \n[CVE-2022-35758](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35758>) \n[CVE-2022-35767](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35767>) \n[CVE-2022-35769](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35769>) \n[CVE-2022-35795](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35795>) \n[CVE-2022-35760](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35760>) \n[CVE-2022-35768](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35768>) \n[CVE-2022-35752](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35752>) \n[CVE-2022-35793](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35793>) \n[CVE-2022-35747](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35747>) \n[CVE-2022-35743](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35743>) \n[CVE-2022-35756](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35756>) \n[CVE-2022-34702](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34702>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *KB list*:\n[5016686](<http://support.microsoft.com/kb/5016686>) \n[5016669](<http://support.microsoft.com/kb/5016669>) \n[5016679](<http://support.microsoft.com/kb/5016679>) \n[5016676](<http://support.microsoft.com/kb/5016676>)", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T00:00:00", "type": "kaspersky", "title": "KLA12603 Multiple vulnerabilities in Microsoft Products (ESU)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35747", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2022-08-10T00:00:00", "id": "KLA12603", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12603/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:58:53", "description": "### *Detect date*:\n08/09/2022\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, bypass security restrictions, execute arbitrary code, obtain sensitive information.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nWindows 8.1 for x64-based systems \nWindows Server 2012 R2 \nWindows Server 2012 R2 (Server Core installation) \nWindows 10 for 32-bit Systems \nWindows 8.1 for 32-bit systems \nWindows Server 2022 (Server Core installation) \nWindows Server 2019 (Server Core installation) \nWindows Server 2022 \nWindows 10 Version 1809 for 32-bit Systems \nWindows 10 Version 20H2 for x64-based Systems \nWindows 10 Version 1607 for x64-based Systems \nWindows Server 2012 (Server Core installation) \nWindows 10 Version 21H2 for x64-based Systems \nWindows 10 Version 21H1 for 32-bit Systems \nWindows Server 2012 \nWindows 10 Version 20H2 for 32-bit Systems \nWindows 11 for ARM64-based Systems \nWindows Server 2016 \nWindows 10 Version 21H2 for ARM64-based Systems \nWindows 10 Version 1607 for 32-bit Systems \nWindows 10 Version 21H2 for 32-bit Systems \nWindows Server 2019 \nWindows 10 for x64-based Systems \nWindows Server, version 20H2 (Server Core Installation) \nWindows RT 8.1 \nWindows 10 Version 21H1 for ARM64-based Systems \nWindows 10 Version 1809 for x64-based Systems \nWindows Server 2016 (Server Core installation) \nWindows 10 Version 21H1 for x64-based Systems \nWindows 10 Version 20H2 for ARM64-based Systems \nWindows 11 for x64-based Systems \nWindows 10 Version 1809 for ARM64-based Systems\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2022-35759](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35759>) \n[CVE-2022-34705](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34705>) \n[CVE-2022-35765](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35765>) \n[CVE-2022-34303](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34303>) \n[CVE-2022-35763](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35763>) \n[CVE-2022-34703](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34703>) \n[CVE-2022-35751](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35751>) \n[CVE-2022-34707](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34707>) \n[CVE-2022-30194](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30194>) \n[CVE-2022-35771](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35771>) \n[CVE-2022-35744](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35744>) \n[CVE-2022-34714](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34714>) \n[CVE-2022-34301](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34301>) \n[CVE-2022-35794](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35794>) \n[CVE-2022-35766](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35766>) \n[CVE-2022-34709](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34709>) \n[CVE-2022-34704](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34704>) \n[CVE-2022-35767](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35767>) \n[CVE-2022-35769](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35769>) \n[CVE-2022-35804](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35804>) \n[CVE-2022-30197](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30197>) \n[CVE-2022-35795](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35795>) \n[CVE-2022-35760](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35760>) \n[CVE-2022-35793](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35793>) \n[CVE-2022-35747](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35747>) \n[CVE-2022-35743](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35743>) \n[CVE-2022-35764](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35764>) \n[CVE-2022-30144](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30144>) \n[CVE-2022-35761](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35761>) \n[CVE-2022-35762](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35762>) \n[CVE-2022-34702](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34702>) \n[CVE-2022-35757](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35757>) \n[CVE-2022-34690](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34690>) \n[CVE-2022-35745](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35745>) \n[CVE-2022-35750](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35750>) \n[CVE-2022-34708](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34708>) \n[CVE-2022-35792](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35792>) \n[CVE-2022-35753](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35753>) \n[CVE-2022-34712](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34712>) \n[CVE-2022-34701](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34701>) \n[CVE-2022-34691](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34691>) \n[CVE-2022-34302](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34302>) \n[CVE-2022-35746](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35746>) \n[CVE-2022-34713](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713>) \n[CVE-2022-35820](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35820>) \n[CVE-2022-34696](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34696>) \n[CVE-2022-33670](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33670>) \n[CVE-2022-34706](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34706>) \n[CVE-2022-34699](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34699>) \n[CVE-2022-35754](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35754>) \n[CVE-2022-35748](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35748>) \n[CVE-2022-30133](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30133>) \n[CVE-2022-35758](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35758>) \n[CVE-2022-35755](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35755>) \n[CVE-2022-35797](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35797>) \n[CVE-2022-35749](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35749>) \n[CVE-2022-35768](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35768>) \n[CVE-2022-35752](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35752>) \n[CVE-2022-34715](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34715>) \n[CVE-2022-34710](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34710>) \n[CVE-2022-35756](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35756>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *KB list*:\n[5016627](<http://support.microsoft.com/kb/5016627>) \n[5016672](<http://support.microsoft.com/kb/5016672>) \n[5016622](<http://support.microsoft.com/kb/5016622>) \n[5016683](<http://support.microsoft.com/kb/5016683>) \n[5016639](<http://support.microsoft.com/kb/5016639>) \n[5016616](<http://support.microsoft.com/kb/5016616>) \n[5016623](<http://support.microsoft.com/kb/5016623>) \n[5016684](<http://support.microsoft.com/kb/5016684>) \n[5016681](<http://support.microsoft.com/kb/5016681>) \n[5012170](<http://support.microsoft.com/kb/5012170>) \n[5016629](<http://support.microsoft.com/kb/5016629>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T00:00:00", "type": "kaspersky", "title": "KLA12602 Multiple vulnerabilities in Microsoft Windows", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34301", "CVE-2022-34302", "CVE-2022-34303", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34712", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-34715", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35797", "CVE-2022-35804", "CVE-2022-35820"], "modified": "2022-09-27T00:00:00", "id": "KLA12602", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12602/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:58:02", "description": "### *Detect date*:\n10/11/2022\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, spoof user interface, obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service.\n\n### *Affected products*:\nWindows 7 for 32-bit Systems Service Pack 1 \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows 7 for x64-based Systems Service Pack 1 \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows Server 2008 for x64-based Systems Service Pack 2\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2022-41033](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41033>) \n[CVE-2022-38029](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38029>) \n[CVE-2022-37994](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37994>) \n[CVE-2022-34689](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34689>) \n[CVE-2022-37985](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37985>) \n[CVE-2022-37975](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37975>) \n[CVE-2022-37999](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37999>) \n[CVE-2022-38032](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38032>) \n[CVE-2022-38051](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38051>) \n[CVE-2022-37976](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37976>) \n[CVE-2022-38042](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38042>) \n[CVE-2022-38047](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38047>) \n[CVE-2022-38044](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38044>) \n[CVE-2022-37981](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37981>) \n[CVE-2022-24504](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24504>) \n[CVE-2022-38040](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38040>) \n[CVE-2022-33634](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33634>) \n[CVE-2022-37990](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37990>) \n[CVE-2022-37982](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37982>) \n[CVE-2022-37997](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37997>) \n[CVE-2022-33635](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33635>) \n[CVE-2022-22035](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22035>) \n[CVE-2022-38038](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38038>) \n[CVE-2022-38043](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38043>) \n[CVE-2022-37988](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37988>) \n[CVE-2022-37991](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37991>) \n[CVE-2022-37993](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37993>) \n[CVE-2022-38026](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38026>) \n[CVE-2022-38041](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38041>) \n[CVE-2022-30198](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30198>) \n[CVE-2022-33645](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33645>) \n[CVE-2022-38034](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38034>) \n[CVE-2022-37977](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37977>) \n[CVE-2022-38033](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38033>) \n[CVE-2022-38022](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38022>) \n[CVE-2022-37986](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37986>) \n[CVE-2022-38037](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38037>) \n[CVE-2022-41081](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41081>) \n[CVE-2022-37987](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37987>) \n[CVE-2022-38031](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38031>) \n[CVE-2022-38000](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38000>) \n[CVE-2022-35770](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35770>) \n[CVE-2022-37989](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37989>) \n[CVE-2022-37978](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37978>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *KB list*:\n[5016622](<http://support.microsoft.com/kb/5016622>) \n[5016686](<http://support.microsoft.com/kb/5016686>) \n[5016669](<http://support.microsoft.com/kb/5016669>) \n[5016679](<http://support.microsoft.com/kb/5016679>) \n[5016676](<http://support.microsoft.com/kb/5016676>) \n[5018446](<http://support.microsoft.com/kb/5018446>) \n[5018479](<http://support.microsoft.com/kb/5018479>) \n[5018450](<http://support.microsoft.com/kb/5018450>) \n[5018454](<http://support.microsoft.com/kb/5018454>)", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-10-11T00:00:00", "type": "kaspersky", "title": "KLA20001 Multiple vulnerabilities in Microsoft Products (ESU)", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-22035", "CVE-2022-24504", "CVE-2022-30198", "CVE-2022-33634", "CVE-2022-33635", "CVE-2022-33645", "CVE-2022-34689", "CVE-2022-35770", "CVE-2022-37975", "CVE-2022-37976", "CVE-2022-37977", "CVE-2022-37978", "CVE-2022-37981", "CVE-2022-37982", "CVE-2022-37985", "CVE-2022-37986", "CVE-2022-37987", "CVE-2022-37988", "CVE-2022-37989", "CVE-2022-37990", "CVE-2022-37991", "CVE-2022-37993", "CVE-2022-37994", "CVE-2022-37997", "CVE-2022-37999", "CVE-2022-38000", "CVE-2022-38022", "CVE-2022-38026", "CVE-2022-38029", "CVE-2022-38031", "CVE-2022-38032", "CVE-2022-38033", "CVE-2022-38034", "CVE-2022-38037", "CVE-2022-38038", "CVE-2022-38040", "CVE-2022-38041", "CVE-2022-38042", "CVE-2022-38043", "CVE-2022-38044", "CVE-2022-38047", "CVE-2022-38051", "CVE-2022-41033", "CVE-2022-41081"], "modified": "2022-10-12T00:00:00", "id": "KLA20001", "href": "https://threats.kaspersky.com/en/vulnerability/KLA20001/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:58:03", "description": "### *Detect date*:\n10/11/2022\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, spoof user interface, obtain sensitive information, cause denial of service, execute arbitrary code, bypass security restrictions.\n\n### *Affected products*:\nWindows Server 2012 \nWindows 8.1 for 32-bit systems \nWindows 10 Version 21H2 for ARM64-based Systems \nWindows 10 Version 21H2 for x64-based Systems \nWindows Server 2019 (Server Core installation) \nWindows 10 Version 21H1 for ARM64-based Systems \nWindows 11 Version 22H2 for ARM64-based Systems \nWindows 10 Version 21H1 for x64-based Systems \nWindows Server 2019 \nWindows 10 Version 21H2 for 32-bit Systems \nWindows Server 2012 R2 (Server Core installation) \nWindows Server 2016 (Server Core installation) \nWindows Server 2022 \nWindows Server 2022 (Server Core installation) \nWindows 10 Version 1809 for ARM64-based Systems \nWindows 10 Version 1809 for 32-bit Systems \nWindows 10 Version 1607 for 32-bit Systems \nWindows 10 Version 1809 for x64-based Systems \nWindows 10 for x64-based Systems \nWindows Server 2012 R2 \nWindows 11 for ARM64-based Systems \nWindows 10 Version 20H2 for ARM64-based Systems \nWindows 10 Version 21H1 for 32-bit Systems \nWindows RT 8.1 \nWindows 10 Version 20H2 for 32-bit Systems \nWindows Server 2016 \nWindows 10 Version 1607 for x64-based Systems \nWindows 10 Version 20H2 for x64-based Systems \nWindows Server 2012 (Server Core installation) \nWindows 11 for x64-based Systems \nWindows 10 for 32-bit Systems \nWindows 8.1 for x64-based systems \nWindows 11 Version 22H2 for x64-based Systems\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2022-38029](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38029>) \n[CVE-2022-34689](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34689>) \n[CVE-2022-37985](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37985>) \n[CVE-2022-37975](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37975>) \n[CVE-2022-37996](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37996>) \n[CVE-2022-38050](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38050>) \n[CVE-2022-37965](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37965>) \n[CVE-2022-37983](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37983>) \n[CVE-2022-38042](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38042>) \n[CVE-2022-37984](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37984>) \n[CVE-2022-37981](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37981>) \n[CVE-2022-24504](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24504>) \n[CVE-2022-33634](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33634>) \n[CVE-2022-37990](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37990>) \n[CVE-2022-38046](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38046>) \n[CVE-2022-38003](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38003>) \n[CVE-2022-38038](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38038>) \n[CVE-2022-37979](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37979>) \n[CVE-2022-37998](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37998>) \n[CVE-2022-37991](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37991>) \n[CVE-2022-37993](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37993>) \n[CVE-2022-38041](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38041>) \n[CVE-2022-38030](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38030>) \n[CVE-2022-38027](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38027>) \n[CVE-2022-33645](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33645>) \n[CVE-2022-38034](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38034>) \n[CVE-2022-37977](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37977>) \n[CVE-2022-38033](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38033>) \n[CVE-2022-38037](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38037>) \n[CVE-2022-38028](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38028>) \n[CVE-2022-38000](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38000>) \n[CVE-2022-37989](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37989>) \n[CVE-2022-37978](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37978>) \n[CVE-2022-41033](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41033>) \n[CVE-2022-37994](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37994>) \n[CVE-2022-37974](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37974>) \n[CVE-2022-38021](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38021>) \n[CVE-2022-37999](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37999>) \n[CVE-2022-37973](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37973>) \n[CVE-2022-38032](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38032>) \n[CVE-2022-38045](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38045>) \n[CVE-2022-38051](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38051>) \n[CVE-2022-37976](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37976>) \n[CVE-2022-38047](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38047>) \n[CVE-2022-38044](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38044>) \n[CVE-2022-38040](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38040>) \n[CVE-2022-37970](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37970>) \n[CVE-2022-37982](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37982>) \n[CVE-2022-38025](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38025>) \n[CVE-2022-37997](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37997>) \n[CVE-2022-38016](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38016>) \n[CVE-2022-33635](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33635>) \n[CVE-2022-22035](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22035>) \n[CVE-2022-37980](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37980>) \n[CVE-2022-38043](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38043>) \n[CVE-2022-37995](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37995>) \n[CVE-2022-37988](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37988>) \n[CVE-2022-38026](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38026>) \n[CVE-2022-30198](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30198>) \n[CVE-2022-38022](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38022>) \n[CVE-2022-37986](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37986>) \n[CVE-2022-38039](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38039>) \n[CVE-2022-38036](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38036>) \n[CVE-2022-41081](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41081>) \n[CVE-2022-37987](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37987>) \n[CVE-2022-38031](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38031>) \n[CVE-2022-35770](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35770>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *KB list*:\n[5016627](<http://support.microsoft.com/kb/5016627>) \n[5016672](<http://support.microsoft.com/kb/5016672>) \n[5016622](<http://support.microsoft.com/kb/5016622>) \n[5016683](<http://support.microsoft.com/kb/5016683>) \n[5016639](<http://support.microsoft.com/kb/5016639>) \n[5016616](<http://support.microsoft.com/kb/5016616>) \n[5016623](<http://support.microsoft.com/kb/5016623>) \n[5016684](<http://support.microsoft.com/kb/5016684>) \n[5016681](<http://support.microsoft.com/kb/5016681>) \n[5016629](<http://support.microsoft.com/kb/5016629>) \n[5018474](<http://support.microsoft.com/kb/5018474>) \n[5018478](<http://support.microsoft.com/kb/5018478>) \n[5018418](<http://support.microsoft.com/kb/5018418>) \n[5018476](<http://support.microsoft.com/kb/5018476>) \n[5018427](<http://support.microsoft.com/kb/5018427>) \n[5018457](<http://support.microsoft.com/kb/5018457>) \n[5018410](<http://support.microsoft.com/kb/5018410>) \n[5018425](<http://support.microsoft.com/kb/5018425>) \n[5018421](<http://support.microsoft.com/kb/5018421>) \n[5018411](<http://support.microsoft.com/kb/5018411>) \n[5018419](<http://support.microsoft.com/kb/5018419>)", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-10-11T00:00:00", "type": "kaspersky", "title": "KLA20000 Multiple vulnerabilities in Microsoft Windows", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-22035", "CVE-2022-24504", "CVE-2022-30198", "CVE-2022-33634", "CVE-2022-33635", "CVE-2022-33645", "CVE-2022-34689", "CVE-2022-35770", "CVE-2022-37965", "CVE-2022-37970", "CVE-2022-37973", "CVE-2022-37974", "CVE-2022-37975", "CVE-2022-37976", "CVE-2022-37977", "CVE-2022-37978", "CVE-2022-37979", "CVE-2022-37980", "CVE-2022-37981", "CVE-2022-37982", "CVE-2022-37983", "CVE-2022-37984", "CVE-2022-37985", "CVE-2022-37986", "CVE-2022-37987", "CVE-2022-37988", "CVE-2022-37989", "CVE-2022-37990", "CVE-2022-37991", "CVE-2022-37993", "CVE-2022-37994", "CVE-2022-37995", "CVE-2022-37996", "CVE-2022-37997", "CVE-2022-37998", "CVE-2022-37999", "CVE-2022-38000", "CVE-2022-38003", "CVE-2022-38016", "CVE-2022-38021", "CVE-2022-38022", "CVE-2022-38025", "CVE-2022-38026", "CVE-2022-38027", "CVE-2022-38028", "CVE-2022-38029", "CVE-2022-38030", "CVE-2022-38031", "CVE-2022-38032", "CVE-2022-38033", "CVE-2022-38034", "CVE-2022-38036", "CVE-2022-38037", "CVE-2022-38038", "CVE-2022-38039", "CVE-2022-38040", "CVE-2022-38041", "CVE-2022-38042", "CVE-2022-38043", "CVE-2022-38044", "CVE-2022-38045", "CVE-2022-38046", "CVE-2022-38047", "CVE-2022-38050", "CVE-2022-38051", "CVE-2022-41033", "CVE-2022-41081"], "modified": "2022-10-12T00:00:00", "id": "KLA20000", "href": "https://threats.kaspersky.com/en/vulnerability/KLA20000/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2023-05-17T16:33:51", "description": "The remote Windows host is missing security update 5016679. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016679: Windows 7 and Windows Server 2008 R2 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35747", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2023-02-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016679.NASL", "href": "https://www.tenable.com/plugins/nessus/163952", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163952);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/02/09\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30194\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35747\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35756\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35793\",\n \"CVE-2022-35795\",\n \"CVE-2022-35820\"\n );\n script_xref(name:\"MSKB\", value:\"5016676\");\n script_xref(name:\"MSKB\", value:\"5016679\");\n script_xref(name:\"MSFT\", value:\"MS22-5016676\");\n script_xref(name:\"MSFT\", value:\"MS22-5016679\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016679: Windows 7 and Windows Server 2008 R2 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016679. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016676\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016679\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016676\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016679\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016679 or Cumulative Update 5016676\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-30133\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016679',\n '5016676'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win7:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.1',\n sp:1,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016679, 5016676])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-06-02T16:39:43", "description": "The remote Windows host is missing security update 5016686. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016686: Windows Server 2008 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34714", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35747", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793"], "modified": "2023-02-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016686.NASL", "href": "https://www.tenable.com/plugins/nessus/163942", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163942);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/02/09\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30194\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34714\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35747\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35793\"\n );\n script_xref(name:\"MSKB\", value:\"5016669\");\n script_xref(name:\"MSKB\", value:\"5016686\");\n script_xref(name:\"MSFT\", value:\"MS22-5016669\");\n script_xref(name:\"MSFT\", value:\"MS22-5016686\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016686: Windows Server 2008 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016686. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016669\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016686\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016669\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016686\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016686 or Cumulative Update 5016669\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-30133\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016686',\n '5016669'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(vista:'2') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.0',\n sp:2,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016686, 5016669])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:33:38", "description": "The remote Windows host is missing security update 5016683. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016683: Windows Server 2012 R2 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2023-02-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016683.NASL", "href": "https://www.tenable.com/plugins/nessus/163947", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163947);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/02/09\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30144\",\n \"CVE-2022-30194\",\n \"CVE-2022-33670\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35748\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35754\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35793\",\n \"CVE-2022-35795\",\n \"CVE-2022-35820\"\n );\n script_xref(name:\"MSKB\", value:\"5016681\");\n script_xref(name:\"MSKB\", value:\"5016683\");\n script_xref(name:\"MSFT\", value:\"MS22-5016681\");\n script_xref(name:\"MSFT\", value:\"MS22-5016683\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016683: Windows Server 2012 R2 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016683. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016681\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016683\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016681\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016683\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016683 or Cumulative Update 5016681\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-30133\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016683',\n '5016681'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.3',\n sp:0,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016683, 5016681])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:33:25", "description": "The remote Windows host is missing security update 5016639. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016639: Windows 10 LTS 1507 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35793", "CVE-2022-35795"], "modified": "2023-02-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016639.NASL", "href": "https://www.tenable.com/plugins/nessus/163941", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163941);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/02/09\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30144\",\n \"CVE-2022-30194\",\n \"CVE-2022-33670\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34703\",\n \"CVE-2022-34704\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34709\",\n \"CVE-2022-34710\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35754\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35771\",\n \"CVE-2022-35793\",\n \"CVE-2022-35795\"\n );\n script_xref(name:\"MSKB\", value:\"5016639\");\n script_xref(name:\"MSFT\", value:\"MS22-5016639\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016639: Windows 10 LTS 1507 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016639. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016639\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016639\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016639\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-30133\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016639'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n os_build:10240,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016639])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T04:33:43", "description": "The remote Windows host is missing security update 5016622. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016622: Windows 10 Version 1607 and Windows Server 2016 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35795"], "modified": "2023-02-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016622.NASL", "href": "https://www.tenable.com/plugins/nessus/163940", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163940);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/02/09\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30144\",\n \"CVE-2022-30194\",\n \"CVE-2022-33670\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34699\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34703\",\n \"CVE-2022-34704\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34709\",\n \"CVE-2022-34710\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35748\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35754\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35761\",\n \"CVE-2022-35762\",\n \"CVE-2022-35763\",\n \"CVE-2022-35764\",\n \"CVE-2022-35765\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35771\",\n \"CVE-2022-35792\",\n \"CVE-2022-35793\",\n \"CVE-2022-35795\"\n );\n script_xref(name:\"MSKB\", value:\"5016622\");\n script_xref(name:\"MSFT\", value:\"MS22-5016622\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016622: Windows 10 Version 1607 and Windows Server 2016 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016622. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016622\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016622\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016622\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-30133\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016622'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n os_build:14393,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016622])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:33:38", "description": "The remote Windows host is missing security update 5016629. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016629: Windows 11 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34301", "CVE-2022-34302", "CVE-2022-34303", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34712", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35797", "CVE-2022-35804", "CVE-2022-35820"], "modified": "2023-02-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016629.NASL", "href": "https://www.tenable.com/plugins/nessus/163945", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163945);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/02/09\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30144\",\n \"CVE-2022-30194\",\n \"CVE-2022-30197\",\n \"CVE-2022-33670\",\n \"CVE-2022-34301\",\n \"CVE-2022-34302\",\n \"CVE-2022-34303\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34699\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34703\",\n \"CVE-2022-34704\",\n \"CVE-2022-34705\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34709\",\n \"CVE-2022-34710\",\n \"CVE-2022-34712\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35754\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35757\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35761\",\n \"CVE-2022-35766\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35771\",\n \"CVE-2022-35793\",\n \"CVE-2022-35794\",\n \"CVE-2022-35795\",\n \"CVE-2022-35797\",\n \"CVE-2022-35804\",\n \"CVE-2022-35820\"\n );\n script_xref(name:\"MSKB\", value:\"5016629\");\n script_xref(name:\"MSFT\", value:\"MS22-5016629\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016629: Windows 11 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016629. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016629\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016629\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016629\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-35804\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2022-30133\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016629'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n os_build:22000,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016629])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T04:33:44", "description": "The remote Windows host is missing security update 5016623. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016623: Windows 10 version 1809 / Windows Server 2019 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35797"], "modified": "2023-02-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016623.NASL", "href": "https://www.tenable.com/plugins/nessus/163946", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163946);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/02/09\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30144\",\n \"CVE-2022-30194\",\n \"CVE-2022-30197\",\n \"CVE-2022-33670\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34699\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34703\",\n \"CVE-2022-34704\",\n \"CVE-2022-34705\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34709\",\n \"CVE-2022-34710\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35748\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35754\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35757\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35761\",\n \"CVE-2022-35762\",\n \"CVE-2022-35763\",\n \"CVE-2022-35764\",\n \"CVE-2022-35765\",\n \"CVE-2022-35766\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35771\",\n \"CVE-2022-35792\",\n \"CVE-2022-35793\",\n \"CVE-2022-35794\",\n \"CVE-2022-35795\",\n \"CVE-2022-35797\"\n );\n script_xref(name:\"MSKB\", value:\"5016623\");\n script_xref(name:\"MSFT\", value:\"MS22-5016623\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016623: Windows 10 version 1809 / Windows Server 2019 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016623. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016623\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016623\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016623\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-30133\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016623'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n os_build:17763,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016623])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:33:25", "description": "The remote Windows host is missing security update 5016616. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016616: Windows 10 Version 20H2 / 21H1 / 21H2 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34301", "CVE-2022-34302", "CVE-2022-34303", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34712", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35797", "CVE-2022-35820"], "modified": "2023-02-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016616.NASL", "href": "https://www.tenable.com/plugins/nessus/163951", "sourceData": "##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163951);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/02/09\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30144\",\n \"CVE-2022-30194\",\n \"CVE-2022-30197\",\n \"CVE-2022-33670\",\n \"CVE-2022-34301\",\n \"CVE-2022-34302\",\n \"CVE-2022-34303\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34699\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34703\",\n \"CVE-2022-34704\",\n \"CVE-2022-34705\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34709\",\n \"CVE-2022-34710\",\n \"CVE-2022-34712\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35748\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35754\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35757\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35761\",\n \"CVE-2022-35762\",\n \"CVE-2022-35763\",\n \"CVE-2022-35764\",\n \"CVE-2022-35765\",\n \"CVE-2022-35766\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35771\",\n \"CVE-2022-35792\",\n \"CVE-2022-35793\",\n \"CVE-2022-35794\",\n \"CVE-2022-35795\",\n \"CVE-2022-35797\",\n \"CVE-2022-35820\"\n );\n script_xref(name:\"MSKB\", value:\"5016616\");\n script_xref(name:\"MSFT\", value:\"MS22-5016616\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016616: Windows 10 Version 20H2 / 21H1 / 21H2 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016616. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016616\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016616\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016616\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-30133\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016616'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nvar os_name = get_kb_item(\"SMB/ProductName\");\n\nif ( ( (\"enterprise\" >< tolower(os_name) || \"education\" >< tolower(os_name))\n &&\n smb_check_rollup(os:'10',\n os_build:19042,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016616]) \n )\n ||\n smb_check_rollup(os:'10',\n os_build:19043,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016616])\n || \n smb_check_rollup(os:'10',\n os_build:19044,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016616])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:33:25", "description": "The remote Windows host is missing security update 5016627. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016627: Windows Server 2022 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34301", "CVE-2022-34302", "CVE-2022-34303", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34712", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-34715", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2023-02-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016627.NASL", "href": "https://www.tenable.com/plugins/nessus/163953", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163953);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/02/09\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30194\",\n \"CVE-2022-30197\",\n \"CVE-2022-33670\",\n \"CVE-2022-34301\",\n \"CVE-2022-34302\",\n \"CVE-2022-34303\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34699\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34703\",\n \"CVE-2022-34704\",\n \"CVE-2022-34705\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34709\",\n \"CVE-2022-34710\",\n \"CVE-2022-34712\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-34715\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35748\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35757\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35761\",\n \"CVE-2022-35762\",\n \"CVE-2022-35763\",\n \"CVE-2022-35764\",\n \"CVE-2022-35765\",\n \"CVE-2022-35766\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35771\",\n \"CVE-2022-35792\",\n \"CVE-2022-35793\",\n \"CVE-2022-35794\",\n \"CVE-2022-35795\",\n \"CVE-2022-35820\"\n );\n script_xref(name:\"MSKB\", value:\"5016627\");\n script_xref(name:\"MSFT\", value:\"MS22-5016627\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016627: Windows Server 2022 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016627. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016627\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016627\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016627\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-34715\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016627'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n os_build:20348,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016627])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "talosblog": [{"lastseen": "2022-08-10T16:58:32", "description": "[](<https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIxoLWRMhadA-_KYScFgU4r2bphbJQie1KMf5HidfCLhMK1eYN333LxM5v_EiExr0ojMt17sBFFPh4XhavE7u02EWHwd-vEkfU45UgMTDaBEdUUf9mR6_ZRuaGkrOXoRMEBSmlFYTE1F8n0wrdRBy8pN7IFwoy1K7YHKYUTnGyiWeAxLeWfSTa2rCc/s1001/patch%20tuesday.jpg>)\n\n \n_ \n_\n\n_By Jon Munshaw and Vanja Svajcer._\n\nMicrosoft released its monthly security update Tuesday, disclosing more than 120 vulnerabilities across its line of products and software, the most in a single Patch Tuesday [in four months](<https://blog.talosintelligence.com/2022/04/microsoft-patch-tuesday-includes-most.html>). \n\nThis batch of updates also includes a fix for a new vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT) that\u2019s actively being exploited in the wild, according to Microsoft. MSDT was already the target of the so-called [\u201cFollina\u201d zero-day vulnerability](<https://blog.talosintelligence.com/2022/06/msdt-follina-coverage.html>) in June. \n\nIn all, August\u2019s Patch Tuesday includes 15 critical vulnerabilities and a single low- and moderate-severity issue. The remainder is classified as \u201cimportant.\u201d \n\nTwo of the important vulnerabilities [CVE-2022-35743](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35743>) and [CVE-2022-34713](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34713>) are remote code execution vulnerabilities in MSDT. However, only CVE-2022-34713 has been exploited in the wild and Microsoft considers it \u201cmore likely\u201d to be exploited. \n\nMicrosoft Exchange Server contains two critical elevation of privilege vulnerabilities, [CVE-2022-21980](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21980>) and [CVE-2022-24477](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24477>). An attacker could exploit this vulnerability by tricking a target into visiting a malicious, attacker-hosted server or website. In addition to applying the patch released today, potentially affected users should enable Extended Protection on vulnerable versions of the server. \n\nThe Windows Point-to-Point Tunneling Protocol is also vulnerable to three critical vulnerabilities. Two of them, [CVE-2022-35744](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35744>) and [CVE-2022-30133](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30133>), could allow an attacker to execute remote code on an RAS server machine. The other, [CVE-2022-35747](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35747>), could lead to a denial-of-service condition. CVE-2022-35744 has a CVSS severity score of 9.8 out of 10, one of the highest-rated vulnerabilities this month. An attacker could exploit these vulnerabilities by communicating via Port 1723. Affected users can render these issues unexploitable by blocking that port, though it runs the risk of disrupting other legitimate communications. \n\nAnother critical code execution vulnerability, [CVE-2022-35804](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35804>), affects the SMB Client and Server and the way the protocol handles specific requests. An attacker could exploit this on the SMB Client by configuring a malicious SMBv3 server and tricking a user into connecting to it through a phishing link. It could also be exploited in the Server by sending specially crafted packets to the server. \n\nMicrosoft recommended that users block access to Port 445 to protect against the exploitation of CVE-2022-35804. However, only certain versions of Windows 11 are vulnerable to this issue. \n\nTalos would also like to highlight eight important vulnerabilities that Microsoft considers to be \u201cmore likely\u201d to be exploited: \n\n * [CVE-2022-34699](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34699>): Win32k elevation of privilege vulnerability \n * [CVE-2022-35748](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35748>): HTTP.sys denial-of-service vulnerability \n * [CVE-2022-35750](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35750>): Win32k elevation of privilege vulnerability \n * [CVE-2022-35751](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35751>): Windows Hyper-V elevation of privilege vulnerability \n * [CVE-2022-35755](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35755>): Windows print spooler elevation of privilege vulnerability \n * [CVE-2022-35756](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35756>): Windows Kerberos elevation of privilege vulnerability \n * [CVE-2022-35761](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35761>): Windows Kernel elevation of privilege vulnerability \n * [CVE-2022-35793](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35793>): Windows Print Spooler elevation of privilege vulnerability \n\nA complete list of all the vulnerabilities Microsoft disclosed this month is available on its [update page](<https://portal.msrc.microsoft.com/en-us/security-guidance>). \n\nIn response to these vulnerability disclosures, Talos is releasing a new Snort rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Cisco Secure Firewall customers should use the latest update to their ruleset by updating their SRU. Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org. \n\nThe rules included in this release that protect against the exploitation of many of these vulnerabilities are 60371 - 60380, 60382 - 60384, 60386 and 60387. There are also Snort 3 rules 300233 - 300239.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:44:00", "type": "talosblog", "title": "Microsoft Patch Tuesday for August 2022 \u2014 Snort rules and prominent vulnerabilities", "bulletinFamily": "blog", "cvss2": {}, "cvelist": ["CVE-2022-21980", "CVE-2022-24477", "CVE-2022-30133", "CVE-2022-34699", "CVE-2022-34713", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35761", "CVE-2022-35793", "CVE-2022-35804"], "modified": "2022-08-10T15:09:15", "id": "TALOSBLOG:E9524F807CE78585C607B458809D0AD7", "href": "http://blog.talosintelligence.com/2022/08/microsoft-patch-tuesday-for-august-2022.html", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2022-08-11T18:12:01", "description": "[](<https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLGV0qm1JxU91RjdxVIuHS5qpDp6eR5oqC3GXE4GKh74vcE6eErdX-odGGmldK4seEV08PmWVUMwC9eHiY-MNvEWPJqq7kEe3k9gjAfn0ai-JRQnZ3GdRiAki_wed_Ctz2-MbeTD591fAVRErXhYumK3_GFcUGqEBUmnA_aeVfgK2rZKQ7AW0eYUiY/s2000/threat-source-newsletter.jpg>)\n\n_By Jon Munshaw. _\n\n[](<https://engage2demand.cisco.com/SubscribeTalosThreatSource>)\n\nWelcome to this week\u2019s edition of the Threat Source newsletter. \n\n \n\n\nEveryone seems to want to create the next \u201cNetflix\u201d of something. Xbox\u2019s Game Pass is the [\u201cNetflix of video games.\u201d](<https://www.techradar.com/news/xbox-game-pass-is-taking-a-feature-from-netflix>) Rent the Runway is a [\u201cNetflix of fashion\u201d](<https://www.huffpost.com/entry/netflix-for-fashion-my-ex_b_9630844>) where customers subscribe to a rotation of fancy clothes. \n\n \n\n\nAnd now threat actors are looking to be the \u201cNetflix of malware.\u201d All categories of malware have some sort of \"[as-a-service](<https://www.itgovernance.co.uk/cyber-security-as-a-service>)\" twist now. Some of the largest ransomware groups in the world [operate \u201cas a service,\u201d](<https://blog.talosintelligence.com/2021/06/talos-takes-ep-57-ransomware-as-service.html>) allowing smaller groups to pay a fee in exchange for using the larger group\u2019s tools. \n\n \n\n\nOur [latest report](<https://talosintelligence.com/resources/488>) on information-stealers points out that \u201cinfostealers as-a-service\" are growing in popularity, and our researchers also discovered a [new \u201cC2 as-a-service\" platform](<https://blog.talosintelligence.com/2022/08/dark-utilities.html>) where attackers can pay to have this third-party site act as their command and control. And like Netflix, this Dark Utilities site offers several other layers of tools and malware to choose from. This is a particularly scary trend to me because of how easy \u2014 relatively speaking \u2014 this makes things for anyone with a basic knowledge of computers to carry out a cyber attack. Netflix made it easy for people like my Grandma to find everything she needs in one place to watch anything from throwback shows like \u201cNight Rider\u201d to the live action of \u201cShrek: The Musical\u201d and everything in between. \n\n \n\n\nHow much longer before anyone with access to the internet can log into a singular dark web site and surf for whatever they\u2019re in the mood for that day? As someone who has spent zero time on the actual dark web, this may already exist and I don\u2019t even know about it, but maybe a threat actor will one day be smart enough to make a website that looks as sleek as Netflix so you can scroll through suggestions and hand-pick the Redline information-stealer followed up by a relaxing evening of ransomware from Conti. \n\n \n\n\nWith everything going \u201cas a service\u201d it means I don\u2019t necessarily have to have the coding skills to create my own bespoke malware. So long as I have the cash, I could conceivably buy an out-of-the-box tool online and deploy it against whoever I want. \n\n \n\n\nThis is not necessarily as easy as picking a show on Netflix. But it\u2019s not a huge leap to look at the skills gap Netflix closes by allowing my Grandma to surf for any show she wants without having to scroll through cable channels or drive to the library to check out a DVD, and someone who knows how to use PowerShell being able to launch an \u201cas-a-service\" ransomware attack. \n\n \n\n\nI have no idea what the easy solution is here aside from all the traditional forms of detection and prevention we preach. Outside of direct law enforcement intervention, there are few ways to take these \u201cas a service\u201d platforms offline. Maybe that just means we need to start working on the \u201cNetflix of cybersecurity tools.\u201d \n\n\n \n\n## The one big thing \n\n> \n\n\nHistorically, cybercrime was considered white-collar criminal behavior perpetrated by those that were knowledgeable and turned bad. Now, technology has become such an integral part of our lives that [anyone with a smartphone and desire can get started in cybercrime](<https://blog.talosintelligence.com/2022/08/smalltime-cybercrime.html>). The growth of cryptocurrencies and associated anonymity, whether legitimate or not, has garnered the attention of criminals that formerly operated in traditional criminal enterprises and have now shifted to cybercrime and identity theft. New research from Talos indicates that small-time criminals are increasingly taking part in online crime like phishing, credit card scams and more in favor of traditional \u201chands-on\u201d crime. \n\n\n> ### Why do I care? \n> \n> Everyone panics when the local news shows a graph with \u201cviolent crime\u201d increasing in our respective areas. So we should be just as worried about the increase in cybercrime over the past few years, and the potential for it to grow. As mentioned above, \u201cas a service\u201d malware offerings have made it easier for anyone with internet access to carry out a cyber attack and deploy ransomware or just try to scam someone out of a few thousand dollars. \n> \n> ### So now what? \n> \n> Law enforcement, especially at the local level, is going to need to evolve along with the criminals as they are tasked with protecting the general public. The future criminal is going to be aware of operational security and technologies like Tor to make their arrests increasingly difficult. This is just as good a time as any to remember to talk to your family about cybersecurity and internet safety. Remind family members about common types of scams like the classic \u201cI\u2019m in the hospital and need money.\u201d \n\n> \n> \n\n## Other news of note\n\n \n\n\nMicrosoft Patch Tuesday was headlined by another zero-day vulnerability in the Microsoft Support Diagnostics Tool (MSDT). CVE-2022-35743 and CVE-2022-34713 are remote code execution vulnerabilities in MSDT. However, only CVE-2022-34713 has been exploited in the wild and Microsoft considers it \u201cmore likely\u201d to be exploited. MSDT was already the target of the so-called \u201cFollina\u201d zero-day vulnerability in June. In all, Microsoft patched more than 120 vulnerabilities across all its products. Adobe also released updates to fix 25 vulnerabilities on Tuesday, mainly in Adobe Acrobat Reader. One critical vulnerability could lead to arbitrary code execution and memory leak. ([Talos blog](<https://blog.talosintelligence.com/2022/08/microsoft-patch-tuesday-for-august-2022.html>), [Krebs on Security](<https://krebsonsecurity.com/2022/08/microsoft-patch-tuesday-august-2022-edition/>), [SecurityWeek](<https://www.securityweek.com/adobe-patch-tuesday-code-execution-flaws-acrobat-reader>)) \n\nSome of the U.K.\u2019s 111 services were disrupted earlier this week after a suspected cyber attack against its managed service provider. The country\u2019s National Health System warned residents that some emergency calls could be delayed and others could not schedule health appointments. Advance, the target of the attack, said it was investigating the potential theft of patient data. As of Thursday morning, at least nine NHS mental health trusts could face up to three weeks without access to vulnerable patients\u2019 records, though the incident has been \u201ccontained.\u201d ([SC Magazine](<https://www.scmagazine.com/analysis/business-continuity/cyberattack-disrupts-emergency-services-in-uk-drives-calls-for-healthcare-continuity>), [Bloomberg](<https://www.bloomberg.com/news/articles/2022-08-06/cyber-attack-disrupts-nhs-111-emergency-line-in-uk-telegraph#xj4y7vzkg>), [The Guardian](<https://www.theguardian.com/society/2022/aug/11/fears-patient-data-ransomware-attack-nhs-software-supplier>)) \n\nAn 18-year-old and her mother are facing charges in Nebraska over an alleged medicated abortion based on information obtained from Facebook messages. Court records indicate state law enforcement submitted a search warrant to Meta, the parent company of Facebook, demanding all private data, including messages, that the company had for the two people charged. The contents of those messages were then used as the basis of a second search warrant, in which additional computers and devices were confiscated. Although the investigation began before the U.S. Supreme Court\u2019s reversal of Roe v. Wade, the case highlights a renewed focus on digital privacy and data storage. ([Vice](<https://www.vice.com/en/article/n7zevd/this-is-the-data-facebook-gave-police-to-prosecute-a-teenager-for-abortion>), [CNN](<https://www.cnn.com/2022/08/10/tech/teen-charged-abortion-facebook-messages/index.html>)) \n\n## Can\u2019t get enough Talos? \n\n * * _[DarkReading News Desk at BlackHat](<https://youtu.be/L8wum8NuJAM?t=12719>)_\n * _[Talos Takes Ep. #107: Infostealers 101](<https://talosintelligence.com/podcasts/shows/talos_takes/episodes/107>)_\n * _[Threat Roundup for July 29 - Aug. 5](<https://blog.talosintelligence.com/2022/08/threat-roundup-0729-0805.html>)_\n * _[How cybercrime is going small time](<https://www.protocol.com/sponsored-content/how-cybercrime-is-going-small-time>)_\n * _[Dark Utilities C2 service gains traction among threat actors](<https://www.scmagazine.com/brief/threat-intelligence/dark-utilities-c2-service-gains-traction-among-threat-actors>)_\n\n \n\n\n## Upcoming events where you can find Talos \n\n \n\n\n**[USENIX Security '22](<https://www.usenix.org/conference/usenixsecurity22#registration>) (Aug. 10 - 12, 2022) **\n\nLas Vegas, Nevada \n\n**_ \n_**\n\n**[DEF CON](<https://defcon.org/>) (Aug. 11 - 14, 2022) **\n\nLas Vegas, Nevada \n\n**_ \n_**\n\n**[Security Insights 101 Knowledge Series](<https://aavar.org/securityinsights101/>) (Aug. 25, 2022) **\n\nVirtual \n\n## Most prevalent malware files from Talos telemetry over the past week \n\n** \n**\n\n**SHA 256: **[e4973db44081591e9bff5117946defbef6041397e56164f485cf8ec57b1d8934](<https://www.virustotal.com/gui/file/e4973db44081591e9bff5117946defbef6041397e56164f485cf8ec57b1d8934/details>)** \n****MD5: **93fefc3e88ffb78abb36365fa5cf857c ** \n****Typical Filename: **Wextract \n**Claimed Product: **Internet Explorer \n**Detection Name: **PUA.Win.Trojan.Generic::85.lp.ret.sbx.tg \n\n \n\n\n**SHA 256: **[125e12c8045689bb2a5dcad6fa2644847156dec8b533ee8a3653b432f8fd5645](<https://www.virustotal.com/gui/file/125e12c8045689bb2a5dcad6fa2644847156dec8b533ee8a3653b432f8fd5645/details>) ** **\n\n**MD5: **2c8ea737a232fd03ab80db672d50a17a \n\n**Typical Filename:** LwssPlayer.scr \n\n**Claimed Product: **\u68a6\u60f3\u4e4b\u5dc5\u5e7b\u706f\u64ad\u653e\u5668 \n\n**Detection Name: **Auto.125E12.241442.in02 \n\n \n\n\n**SHA 256: **[e12b6641d7e7e4da97a0ff8e1a0d4840c882569d47b8fab8fb187ac2b475636c](<https://www.virustotal.com/gui/file/e12b6641d7e7e4da97a0ff8e1a0d4840c882569d47b8fab8fb187ac2b475636c/details>) ** **\n\n**MD5:** a087b2e6ec57b08c0d0750c60f96a74c \n\n**Typical Filename: **AAct.exe ** **\n\n**Claimed Product:** N/A ** **\n\n**Detection Name: **PUA.Win.Tool.Kmsauto::1201** **\n\n \n\n\n**SHA 256: **[c67b03c0a91eaefffd2f2c79b5c26a2648b8d3c19a22cadf35453455ff08ead0](<https://www.virustotal.com/gui/file/c67b03c0a91eaefffd2f2c79b5c26a2648b8d3c19a22cadf35453455ff08ead0/details>)** **\n\n**MD5: **8c69830a50fb85d8a794fa46643493b2** **\n\n**Typical Filename: **AAct.exe** **\n\n**Claimed Product: **N/A \n\n**Detection Name: **PUA.Win.Dropper.Generic::1201 \n\n** \n**\n\n**SHA 256: **[168e625c7eb51720f5ce1922aec6ad316b3aaca838bd864ee2bcdbd9b66171d0](<https://www.virustotal.com/gui/file/168e625c7eb51720f5ce1922aec6ad316b3aaca838bd864ee2bcdbd9b66171d0/details>) ** **\n\n**MD5: **311d64e4892f75019ee257b8377c723e \n\n**Typical Filename: **ultrasurf-21-32.exe \n\n**Claimed Product: **N/A** **\n\n**Detection Name: **W32.DFC.MalParent", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-08-11T18:00:00", "type": "talosblog", "title": "Threat Source newsletter (Aug. 11, 2022) \u2014 All of the things-as-a-service", "bulletinFamily": "blog", "cvss2": {}, "cvelist": ["CVE-2022-34713", "CVE-2022-35743"], "modified": "2022-08-11T18:00:00", "id": "TALOSBLOG:A956D5C24762AE2DD21C63305475F8AB", "href": "http://blog.talosintelligence.com/2022/08/threat-source-newsletter-aug-11-2022.html", "cvss": {"score": 0.0, "vector": "NONE"}}], "krebs": [{"lastseen": "2022-08-10T00:01:26", "description": "**Microsoft** today released updates to fix a record 141 security vulnerabilities in its **Windows** operating systems and related software. Once again, Microsoft is patching a zero-day vulnerability in the **Microsoft Support Diagnostics Tool** (MSDT), a service built into Windows. Redmond also addressed multiple flaws in **Exchange Server** -- including one that was disclosed publicly prior to today -- and it is urging organizations that use Exchange for email to update as soon as possible and to enable additional protections.\n\n\n\nIn June, Microsoft patched a vulnerability in MSDT dubbed "**Follina**" that had been [used in active attacks for at least three months prior](<https://krebsonsecurity.com/2022/06/microsoft-patch-tuesday-june-2022-edition/>). This latest MSDT bug -- [CVE-2022-34713](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713>) -- is a remote code execution flaw that requires convincing a target to open a booby-trapped file, such as an Office document. Microsoft this month also issued a different patch for another MSDT flaw, tagged as [CVE-2022-35743](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35743>).\n\nThe publicly disclosed Exchange flaw is [CVE-2022-30134](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30134>), which is an information disclosure weakness. Microsoft also released fixes for three other Exchange flaws that rated a "critical" label, meaning they could be exploited remotely to compromise the system and with no help from users. Microsoft says addressing some of the Exchange vulnerabilities fixed this month requires administrators to enable Windows Extended protection on Exchange Servers. See [Microsoft's blog post on the Exchange Server updates](<https://techcommunity.microsoft.com/t5/exchange-team-blog/released-august-2022-exchange-server-security-updates/ba-p/3593862>) for more details.\n\n"If your organization runs local exchange servers, this trio of CVEs warrant an urgent patch," said **Kevin Breen**, director of cyber threat research for **Immerse Labs**. "Exchanges can be treasure troves of information, making them valuable targets for attackers. With [CVE-2022-24477](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24477>), for example, an attacker can gain initial access to a user's host and could take over the mailboxes for all exchange users, sending and reading emails and documents. For attackers focused on Business Email Compromise this kind of vulnerability can be extremely damaging."\n\nThe other two critical Exchange bugs are tracked as [CVE-2022-24516](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24516>) and [CVE-2022-21980](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21980>). It's difficult to believe it's only been a little more than a year since [malicious hackers worldwide pounced in a bevy of zero-day Exchange vulnerabilities](<https://krebsonsecurity.com/2021/03/a-basic-timeline-of-the-exchange-mass-hack/>) to remotely compromise the email systems for hundreds of thousands of organizations running Exchange Server locally for email. That lingering catastrophe is reminder enough that critical Exchange bugs deserve immediate attention.\n\nThe **SANS Internet Storm Center**'s [rundown on Patch Tuesday](<https://isc.sans.edu/forums/diary/Microsoft%20August%202022%20Patch%20Tuesday/28924/>) warns that a critical remote code execution bug in the Windows Point-to-Point Protocol ([CVE-2022-30133](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30133>)) could become "wormable" -- a threat capable of spreading across a network without any user interaction.\n\n"Another critical vulnerability worth mentioning is an elevation of privilege affecting Active Directory Domain Services ([CVE-2022-34691](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34691>))," SANS wrote. "According to the advisory, 'An authenticated user could manipulate attributes on computer accounts they own or manage, and acquire a certificate from Active Directory Certificate Services that would allow elevation of privilege to System.' A system is vulnerable only if Active Directory Certificate Services is running on the domain. **The CVSS for this vulnerability is 8.8**."\n\nBreen highlighted a set of four vulnerabilities in **Visual Studio** that earned Microsoft's less-dire "important" rating but that nevertheless could be vitally important for the security of developer systems.\n\n"Developers are empowered with access to API keys and deployment pipelines that, if compromised, could be significantly damaging to organizations," he said. "So it\u2019s no surprise they are often targeted by more advanced attackers. Patches for their tools should not be overlooked. We\u2019re seeing a continued trend of supply-chain compromise too, making it vital that we ensure developers, and their tools, are kept up-to-date with the same rigor we apply to standard updates."\n\n**Greg Wiseman**, product manager at **Rapid7**, pointed to an interesting bug Microsoft patched in **Windows Hello**, the biometric authentication mechanism for Windows 10. Microsoft notes that the successful exploitation of the weakness requires physical access to the target device, but would allow an attacker to bypass a facial recognition check.\n\nWiseman said despite the record number of vulnerability fixes from Redmond this month, the numbers are slightly less dire.\n\n"20 CVEs affect their **Chromium-based Edge** browser and 34 affect **Azure Site Recovery** (up from 32 CVEs affecting that product last month)," Wiseman wrote. "As usual, OS-level updates will address a lot of these, but note that some extra configuration is required to fully protect Exchange Server this month."\n\nAs it often does on Patch Tuesday, **Adobe** has also released security updates for many of its products, including **Acrobat** and **Reader**, **Adobe Commerce** and **Magento Open Source**. More details [here](<https://helpx.adobe.com/security.html>).\n\nPlease consider backing up your system or at least your important documents and data before applying system updates. And if you run into any problems with these updates, please drop a note about it here in the comments.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T23:01:10", "type": "krebs", "title": "Microsoft Patch Tuesday, August 2022 Edition", "bulletinFamily": "blog", "cvss2": {}, "cvelist": ["CVE-2022-21980", "CVE-2022-24477", "CVE-2022-24516", "CVE-2022-30133", "CVE-2022-30134", "CVE-2022-34691", "CVE-2022-34713", "CVE-2022-35743"], "modified": "2022-08-09T23:01:10", "id": "KREBS:E877FCDD28FB558BB4B6AFF240F30EA8", "href": "https://krebsonsecurity.com/2022/08/microsoft-patch-tuesday-august-2022-edition/", "cvss": {"score": 0.0, "vector": "NONE"}}], "malwarebytes": [{"lastseen": "2022-08-12T02:01:33", "description": "[Microsoft has published](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>) fixes for 141 separate vulnerabilities in its batch of August updates, fixing a total of 118 CVEs in multiple products. This is a new monthly record if you look at the CVE count.\n\nPublicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services). These are the CVEs that jumped out at us.\n\n## Microsoft Support Diagnostics Tool\n\n[CVE-2022-34713](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34713>): is a Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution (RCE) vulnerability. This is a known to be exploited vulnerability which requires the target to open a specially crafted file. This CVE is a variant of the vulnerability publicly known as [Dogwalk](<https://thehackernews.com/2022/06/researchers-warn-of-unpatched-dogwalk.html>).\n\n[CVE-2022-35743](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35743>): is another MSDT RCE vulnerability. Neither technical details nor an exploit are publicly available, but we do know that user interaction is required and the attack vector is local, so this is very likely another case where a specially crafted file needs to be opened by the victim.\n\n## Microsoft Exchange\n\n[CVE-2022-30134](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30134>): is a Microsoft Exchange Information Disclosure vulnerability. This vulnerability is publicly disclosed but has not yet been detected in attacks. Affected products are Microsoft Exchange Server 2019 CU 11, Microsoft Exchange Server 2016 CU 22, Microsoft Exchange Server 2013 CU 23, Microsoft Exchange Server 2016 CU 23, and Microsoft Exchange Server 2019 CU 12. Users vulnerable to this issue would need to enable Extended Protection in order to prevent exploitation of this vulnerability. More details can be found on the [Exchange Team Blog](<https://techcommunity.microsoft.com/t5/exchange-team-blog/released-august-2022-exchange-server-security-updates/ba-p/3593862>).\n\n[CVE-2022-24477](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24477>): is a Microsoft Exchange Server Elevation of Privilege (EoP) vulnerability. Affected products are Microsoft Exchange Server 2016 CU 23, Microsoft Exchange Server 2019 CU 12, Microsoft Exchange Server 2019 CU 11, Microsoft Exchange Server 2016 CU 22, and Microsoft Exchange Server 2013 CU 23. Users vulnerable to this issue would need to enable Extended Protection in order to prevent exploitation of this vulnerability. More details can be found on the [Exchange Team Blog](<https://techcommunity.microsoft.com/t5/exchange-team-blog/released-august-2022-exchange-server-security-updates/ba-p/3593862>).\n\n[CVE-2022-24516](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24516>): is another a Microsoft Exchange Server EoP vulnerability. Affected products are Microsoft Exchange Server 2016 CU 23, Microsoft Exchange Server 2019 CU 12, Microsoft Exchange Server 2013 CU 23, Microsoft Exchange Server 2019 CU 11, and Microsoft Exchange Server 2016 CU 22. Users vulnerable to this issue would need to enable Extended Protection in order to prevent exploitation of this vulnerability. More details can be found on the [Exchange Team Blog](<https://techcommunity.microsoft.com/t5/exchange-team-blog/released-august-2022-exchange-server-security-updates/ba-p/3593862>).\n\n## Windows Point-to-Point Protocol\n\n[CVE-2022-30133](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30133>): is a Windows Point-to-Point Protocol (PPP) RCE vulnerability with a [CVSS score](<https://www.malwarebytes.com/blog/news/2020/05/how-cvss-works-characterizing-and-scoring-vulnerabilities>) of 9.8 out of 10. An unauthenticated attacker could send a specially crafted connection request to a remote access server (RAS) server, which could lead to remote code execution (RCE) on the RAS server machine. This vulnerability can only be exploited by communicating via port 1723. As a temporary workaround prior to installing the updates that address this vulnerability, you can block traffic through that port thus rendering the vulnerability unexploitable.\n\n## Windows Network File System\n\n[CVE-2022-34715](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34715>): is a Windows Network File System (NFS) RCE vulnerability with a CVSS score of 9.8 out of 10. This vulnerability could be exploited over the network by making an unauthenticated, specially crafted call to a Network File System (NFS) service to trigger a Remote Code Execution (RCE). This vulnerability is not exploitable in NFSV2.0 or NFSV3.0. Prior to updating your version of Windows that protects against this vulnerability, you can mitigate an attack by disabling NFSV4.1. This could adversely affect your ecosystem and should only be used as a temporary mitigation.\n\n## Other vendors\n\nOther vendors have synchronized their periodic updates with Microsoft. Here are few major ones that you may find in your environment.\n\n**Adobe** has also released security updates for many of its products, including Acrobat, Reader, Adobe Commerce, and Magento Open Source. More details [on the Adobe security site](<https://helpx.adobe.com/security.html>).\n\n**Cisco** released security updates for [numerous products](<https://tools.cisco.com/security/center/publicationListing.x>) this month.\n\n**Google** released [Android](<https://source.android.com/security/bulletin/2022-08-01>) security updates.\n\n**SAP **released 5 new [Security Notes](<https://dam.sap.com/mac/app/e/pdf/preview/embed/ucQrx6G?ltr=a&rc=10>).\n\n**VMware **released Security Advisory [VMSA-2022-0022](<https://www.vmware.com/security/advisories/VMSA-2022-0022.html>) and [warned](<https://www.vmware.com/security/advisories/VMSA-2022-0021.html#:~:text=2022%2D08%2D09%3A%20VMSA%2D2022%2D0021.1>) that a recently disclosed auth bypass flaw is [now actively exploited](<https://www.bleepingcomputer.com/news/security/vmware-warns-of-public-exploit-for-critical-auth-bypass-vulnerability/>).", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-10T09:00:00", "type": "malwarebytes", "title": "Update now! Microsoft fixes two zero-days in August's Patch Tuesday", "bulletinFamily": "blog", "cvss2": {}, "cvelist": ["CVE-2022-24477", "CVE-2022-24516", "CVE-2022-30133", "CVE-2022-30134", "CVE-2022-34713", "CVE-2022-34715", "CVE-2022-35743"], "modified": "2022-08-10T09:00:00", "id": "MALWAREBYTES:1E762A45A948B3FD9F8A8DC65D028095", "href": "https://www.malwarebytes.com/blog/news/2022/08/update-now-patch-tuesday-august-2022", "cvss": {"score": 0.0, "vector": "NONE"}}], "rapid7blog": [{"lastseen": "2022-08-10T00:04:15", "description": "\n\nIt's the week of [Hacker Summer Camp](<https://www.rapid7.com/blog/post/2022/08/04/what-were-looking-forward-to-at-black-hat-def-con-and-bsideslv-2022/>) in Las Vegas, and Microsoft has [published](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>) fixes for 141 separate vulnerabilities in their swath of August updates. This is a new monthly record by raw CVE count, but from a patching perspective, the numbers are slightly less dire. 20 CVEs affect their Chromium-based Edge browser, and 34 affect Azure Site Recovery (up from 32 CVEs affecting that product last month). As usual, OS-level updates will address a lot of these, but note that some extra configuration is required to fully protect Exchange Server this month.\n\nThere is one 0-day being patched this month. [CVE-2022-34713](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34713>) is a remote code execution (RCE) vulnerability affecting the Microsoft Windows Support Diagnostic Tool (MSDT) \u2013 it carries a CVSSv3 base score of 7.8, as it requires convincing a potential victim to open a malicious file. The advisory indicates that this CVE is a variant of the \u201cDogwalk\u201d vulnerability, which made news alongside [Follina](<https://www.rapid7.com/blog/post/2022/05/31/cve-2022-30190-follina-microsoft-support-diagnostic-tool-vulnerability/>) (CVE-2022-30190) back in May.\n\nPublicly disclosed, but not (yet) exploited is [CVE-2022-30134](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30134>), an Information Disclosure vulnerability affecting Exchange Server. In this case, simply patching is not sufficient to protect against attackers being able to read targeted email messages. Administrators should [enable Extended Protection](<https://microsoft.github.io/CSS-Exchange/Security/Extended-Protection/>) in order to fully remediate this vulnerability, as well as [the](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21979>) [five](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21980>) [other](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24516>) [vulnerabilities](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24477>) [affecting](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34692>) Exchange this month. Details about how to accomplish this are available via the [Exchange Blog](<https://techcommunity.microsoft.com/t5/exchange-team-blog/released-august-2022-exchange-server-security-updates/ba-p/3593862>).\n\nMicrosoft also patched several flaws affecting Remote Access Server (RAS). The most severe of these ([CVE-2022-30133](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30133>) and [CVE-2022-35744](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35744>)) are related to Windows Point-to-Point Tunneling Protocol and could allow RCE simply by sending a malicious connection request to a server. Seven CVEs affecting the Windows Secure Socket Tunneling Protocol (SSTP) on RAS were also fixed this month: six RCEs and one Denial of Service. If you have RAS in your environment but are unable to patch immediately, consider blocking traffic on port 1723 from your network.\n\nVulnerabilities affecting Windows Network File System (NFS) have been trending in recent months, and today sees Microsoft patching [CVE-2022-34715](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34715>) (RCE, CVSS 9.8) affecting NFSv4.1 on Windows Server 2022.\n\nThis is the worst of it. One last vulnerability to highlight: [CVE-2022-35797](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35797>) is a Security Feature Bypass in [Windows Hello](<https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/windows-hello-face-authentication#external-camera-security>) \u2013 Microsoft\u2019s biometric authentication mechanism for Windows 10. Successful exploitation requires physical access to a system, but would allow an attacker to bypass a facial recognition check.\n\n## Summary charts\n\n\n\n## Summary tables\n\n### Azure vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-35802](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35802>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-30175](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30175>) | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-30176](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30176>) | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-34687](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34687>) | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35773](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35773>) | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35779](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35779>) | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35806](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35806>) | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35772](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35772>) | Azure Site Recovery Remote Code Execution Vulnerability | No | No | 7.2 | Yes \n[CVE-2022-35824](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35824>) | Azure Site Recovery Remote Code Execution Vulnerability | No | No | 7.2 | Yes \n[CVE-2022-33646](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33646>) | Azure Batch Node Agent Elevation of Privilege Vulnerability | No | No | 7 | Yes \n[CVE-2022-35780](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35780>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35781](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35781>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35799](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35799>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35775](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35775>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35801](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35801>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35807](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35807>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35808](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35808>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35782](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35782>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35809](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35809>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35784](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35784>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35810](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35810>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35811](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35811>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35785](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35785>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35786](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35786>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35813](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35813>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35788](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35788>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35814](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35814>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35789](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35789>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35815](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35815>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35790](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35790>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35816](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35816>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35817](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35817>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35791](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35791>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35818](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35818>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35819](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35819>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35776](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35776>) | Azure Site Recovery Denial of Service Vulnerability | No | No | 6.2 | Yes \n[CVE-2022-34685](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34685>) | Azure RTOS GUIX Studio Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34686](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34686>) | Azure RTOS GUIX Studio Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-35774](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35774>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 4.9 | Yes \n[CVE-2022-35800](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35800>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 4.9 | Yes \n[CVE-2022-35787](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35787>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 4.9 | Yes \n[CVE-2022-35821](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35821>) | Azure Sphere Information Disclosure Vulnerability | No | No | 4.4 | Yes \n[CVE-2022-35783](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35783>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 4.4 | Yes \n[CVE-2022-35812](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35812>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 4.4 | Yes \n \n### Browser vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-33649](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33649>) | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | No | No | 9.6 | Yes \n[CVE-2022-33636](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33636>) | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | No | No | 8.3 | Yes \n[CVE-2022-35796](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35796>) | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | No | No | 7.5 | Yes \n[CVE-2022-2624](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2624>) | Chromium: CVE-2022-2624 Heap buffer overflow in PDF | No | No | N/A | Yes \n[CVE-2022-2623](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2623>) | Chromium: CVE-2022-2623 Use after free in Offline | No | No | N/A | Yes \n[CVE-2022-2622](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2622>) | Chromium: CVE-2022-2622 Insufficient validation of untrusted input in Safe Browsing | No | No | N/A | Yes \n[CVE-2022-2621](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2621>) | Chromium: CVE-2022-2621 Use after free in Extensions | No | No | N/A | Yes \n[CVE-2022-2619](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2619>) | Chromium: CVE-2022-2619 Insufficient validation of untrusted input in Settings | No | No | N/A | Yes \n[CVE-2022-2618](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2618>) | Chromium: CVE-2022-2618 Insufficient validation of untrusted input in Internals | No | No | N/A | Yes \n[CVE-2022-2617](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2617>) | Chromium: CVE-2022-2617 Use after free in Extensions API | No | No | N/A | Yes \n[CVE-2022-2616](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2616>) | Chromium: CVE-2022-2616 Inappropriate implementation in Extensions API | No | No | N/A | Yes \n[CVE-2022-2615](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2615>) | Chromium: CVE-2022-2615 Insufficient policy enforcement in Cookies | No | No | N/A | Yes \n[CVE-2022-2614](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2614>) | Chromium: CVE-2022-2614 Use after free in Sign-In Flow | No | No | N/A | Yes \n[CVE-2022-2612](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2612>) | Chromium: CVE-2022-2612 Side-channel information leakage in Keyboard input | No | No | N/A | Yes \n[CVE-2022-2611](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2611>) | Chromium: CVE-2022-2611 Inappropriate implementation in Fullscreen API | No | No | N/A | Yes \n[CVE-2022-2610](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2610>) | Chromium: CVE-2022-2610 Insufficient policy enforcement in Background Fetch | No | No | N/A | Yes \n[CVE-2022-2606](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2606>) | Chromium: CVE-2022-2606 Use after free in Managed devices API | No | No | N/A | Yes \n[CVE-2022-2605](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2605>) | Chromium: CVE-2022-2605 Out of bounds read in Dawn | No | No | N/A | Yes \n[CVE-2022-2604](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2604>) | Chromium: CVE-2022-2604 Use after free in Safe Browsing | No | No | N/A | Yes \n[CVE-2022-2603](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2603>) | Chromium: CVE-2022-2603 Use after free in Omnibox | No | No | N/A | Yes \n \n### Developer Tools vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-35777](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35777>) | Visual Studio Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-35825](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35825>) | Visual Studio Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-35826](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35826>) | Visual Studio Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-35827](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35827>) | Visual Studio Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-34716](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34716>) | .NET Spoofing Vulnerability | No | No | 5.9 | Yes \n \n### ESU Windows vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-30133](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30133>) | Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability | No | No | 9.8 | Yes \n[CVE-2022-35744](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35744>) | Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability | No | No | 9.8 | Yes \n[CVE-2022-34691](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34691>) | Active Directory Domain Services Elevation of Privilege Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-34714](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34714>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-35745](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35745>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-35752](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35752>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-35753](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35753>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-34702](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34702>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-35767](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35767>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-34706](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34706>) | Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-34707](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34707>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35768](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35768>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35756](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35756>) | Windows Kerberos Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35751](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35751>) | Windows Hyper-V Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35795](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35795>) | Windows Error Reporting Service Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35820](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35820>) | Windows Bluetooth Driver Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35750](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35750>) | Win32k Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-34713](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34713>) | Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability | Yes | Yes | 7.8 | Yes \n[CVE-2022-35743](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35743>) | Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35760](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35760>) | Microsoft ATA Port Driver Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-30194](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30194>) | Windows WebBrowser Control Remote Code Execution Vulnerability | No | No | 7.5 | Yes \n[CVE-2022-35769](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35769>) | Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability | No | No | 7.5 | No \n[CVE-2022-35793](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35793>) | Windows Print Spooler Elevation of Privilege Vulnerability | No | No | 7.3 | Yes \n[CVE-2022-34690](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34690>) | Windows Fax Service Elevation of Privilege Vulnerability | No | No | 7.1 | Yes \n[CVE-2022-35759](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35759>) | Windows Local Security Authority (LSA) Denial of Service Vulnerability | No | No | 6.5 | No \n[CVE-2022-35747](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35747>) | Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability | No | No | 5.9 | Yes \n[CVE-2022-35758](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35758>) | Windows Kernel Memory Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34708](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34708>) | Windows Kernel Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34701](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34701>) | Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability | No | No | 5.3 | No \n \n### Exchange Server vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-21980](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21980>) | Microsoft Exchange Server Elevation of Privilege Vulnerability | No | No | 8 | Yes \n[CVE-2022-24516](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24516>) | Microsoft Exchange Server Elevation of Privilege Vulnerability | No | No | 8 | Yes \n[CVE-2022-24477](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24477>) | Microsoft Exchange Server Elevation of Privilege Vulnerability | No | No | 8 | Yes \n[CVE-2022-30134](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30134>) | Microsoft Exchange Information Disclosure Vulnerability | No | Yes | 7.6 | Yes \n[CVE-2022-34692](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34692>) | Microsoft Exchange Information Disclosure Vulnerability | No | No | 5.3 | Yes \n[CVE-2022-21979](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21979>) | Microsoft Exchange Information Disclosure Vulnerability | No | No | 4.8 | Yes \n \n### Microsoft Office vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-34717](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34717>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-33648](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33648>) | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35742](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35742>) | Microsoft Outlook Denial of Service Vulnerability | No | No | 7.5 | Yes \n[CVE-2022-33631](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33631>) | Microsoft Excel Security Feature Bypass Vulnerability | No | No | 7.3 | Yes \n \n### System Center Azure vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-33640](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33640>) | System Center Operations Manager: Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n \n### Windows vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-34715](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34715>) | Windows Network File System Remote Code Execution Vulnerability | No | No | 9.8 | Yes \n[CVE-2022-35804](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35804>) | SMB Client and Server Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-35761](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35761>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 8.4 | Yes \n[CVE-2022-35766](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35766>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-35794](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35794>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-34699](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34699>) | Windows Win32k Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-33670](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33670>) | Windows Partition Management Driver Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-34703](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34703>) | Windows Partition Management Driver Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-34696](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34696>) | Windows Hyper-V Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35746](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35746>) | Windows Digital Media Receiver Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35749](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35749>) | Windows Digital Media Receiver Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-34705](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34705>) | Windows Defender Credential Guard Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35771](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35771>) | Windows Defender Credential Guard Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35762](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35762>) | Storage Spaces Direct Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35763](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35763>) | Storage Spaces Direct Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35764](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35764>) | Storage Spaces Direct Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35765](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35765>) | Storage Spaces Direct Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35792](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35792>) | Storage Spaces Direct Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-30144](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30144>) | Windows Bluetooth Service Remote Code Execution Vulnerability | No | No | 7.5 | Yes \n[CVE-2022-35748](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35748>) | HTTP.sys Denial of Service Vulnerability | No | No | 7.5 | Yes \n[CVE-2022-35755](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35755>) | Windows Print Spooler Elevation of Privilege Vulnerability | No | No | 7.3 | Yes \n[CVE-2022-35757](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35757>) | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | No | No | 7.3 | Yes \n[CVE-2022-35754](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35754>) | Unified Write Filter Elevation of Privilege Vulnerability | No | No | 6.7 | Yes \n[CVE-2022-35797](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35797>) | Windows Hello Security Feature Bypass Vulnerability | No | No | 6.1 | Yes \n[CVE-2022-34709](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34709>) | Windows Defender Credential Guard Security Feature Bypass Vulnerability | No | No | 6 | Yes \n[CVE-2022-30197](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30197>) | Windows Kernel Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34710](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34710>) | Windows Defender Credential Guard Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34712](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34712>) | Windows Defender Credential Guard Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34704](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34704>) | Windows Defender Credential Guard Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34303](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34303>) | CERT/CC: CVE-20220-34303 Crypto Pro Boot Loader Bypass | No | No | N/A | Yes \n[CVE-2022-34302](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34302>) | CERT/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass | No | No | N/A | Yes \n[CVE-2022-34301](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34301>) | CERT/CC: CVE-2022-34301 Eurosoft Boot Loader Bypass | No | No | N/A | Yes \n \n#### NEVER MISS A BLOG\n\nGet the latest stories, expertise, and news about security today.\n\nSubscribe", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T19:34:51", "type": "rapid7blog", "title": "Patch Tuesday - August 2022", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-21979", "CVE-2022-21980", "CVE-2022-24477", "CVE-2022-24516", "CVE-2022-2603", "CVE-2022-2604", "CVE-2022-2605", "CVE-2022-2606", "CVE-2022-2610", "CVE-2022-2611", "CVE-2022-2612", "CVE-2022-2614", "CVE-2022-2615", "CVE-2022-2616", "CVE-2022-2617", "CVE-2022-2618", "CVE-2022-2619", "CVE-2022-2621", "CVE-2022-2622", "CVE-2022-2623", "CVE-2022-2624", "CVE-2022-30133", "CVE-2022-30134", "CVE-2022-30144", "CVE-2022-30175", "CVE-2022-30176", "CVE-2022-30190", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33631", "CVE-2022-33636", "CVE-2022-33640", "CVE-2022-33646", "CVE-2022-33648", "CVE-2022-33649", "CVE-2022-33670", "CVE-2022-34301", "CVE-2022-34302", "CVE-2022-34303", "CVE-2022-34685", "CVE-2022-34686", "CVE-2022-34687", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34692", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34712", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-34715", "CVE-2022-34716", "CVE-2022-34717", "CVE-2022-35742", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35772", "CVE-2022-35773", "CVE-2022-35774", "CVE-2022-35775", "CVE-2022-35776", "CVE-2022-35777", "CVE-2022-35779", "CVE-2022-35780", "CVE-2022-35781", "CVE-2022-35782", "CVE-2022-35783", "CVE-2022-35784", "CVE-2022-35785", "CVE-2022-35786", "CVE-2022-35787", "CVE-2022-35788", "CVE-2022-35789", "CVE-2022-35790", "CVE-2022-35791", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35796", "CVE-2022-35797", "CVE-2022-35799", "CVE-2022-35800", "CVE-2022-35801", "CVE-2022-35802", "CVE-2022-35804", "CVE-2022-35806", "CVE-2022-35807", "CVE-2022-35808", "CVE-2022-35809", "CVE-2022-35810", "CVE-2022-35811", "CVE-2022-35812", "CVE-2022-35813", "CVE-2022-35814", "CVE-2022-35815", "CVE-2022-35816", "CVE-2022-35817", "CVE-2022-35818", "CVE-2022-35819", "CVE-2022-35820", "CVE-2022-35821", "CVE-2022-35824", "CVE-2022-35825", "CVE-2022-35826", "CVE-2022-35827"], "modified": "2022-08-09T19:34:51", "id": "RAPID7BLOG:882168BD332366CE296FB09DC00E018E", "href": "https://blog.rapid7.com/2022/08/09/patch-tuesday-august-2022/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-10-11T22:01:25", "description": "\n\nThe [October batch](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Oct>) of CVEs published by Microsoft includes 96 vulnerabilities, including 12 fixed earlier this month that affect the Chromium project used by their Edge browser.\n\nTop of mind for many this month is whether Microsoft would patch the two [Exchange Server zero-day vulnerabilities](<https://www.rapid7.com/blog/post/2022/09/29/suspected-post-authentication-zero-day-vulnerabilities-in-microsoft-exchange-server/>) ([CVE-2022-41040](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41040>) and [CVE-2022-41082](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41082>)) disclosed at the end of September. While Microsoft was relatively quick to acknowledge the vulnerabilities and [provide mitigation steps](<https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/>), their guidance has continually changed as the recommended rules to block attack traffic get bypassed. This whack-a-mole approach seems likely to continue until a proper patch addressing the root causes is available; unfortunately, it doesn\u2019t look like that will be happening today. Thankfully, the impact should be more limited than 2021\u2019s ProxyShell and ProxyLogon vulnerabilities due to attackers needing to be authenticated to the server for successful exploitation. Reports are also surfacing about an additional zero-day distinct from these being used in ransomware attacks; however, these have not yet been substantiated.\n\nMicrosoft did address two other zero-day vulnerabilities with today\u2019s patches. [CVE-2022-41033](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41033>), an Elevation of Privilege vulnerability affecting the COM+ Event System Service in all supported versions of Windows, has been seen exploited in the wild. [CVE-2022-41043](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41043>) is an Information Disclosure vulnerability affecting Office for Mac that was publicly disclosed but not (yet) seen exploited in the wild.\n\nNine CVEs categorized as Remote Code Execution (RCE) with Critical severity were also patched today \u2013 seven of them affect the Point-to-Point Tunneling Protocol, and like those fixed last month, require an attacker to win a race condition to exploit them. [CVE-2022-38048](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-38048>) affects all supported versions of Office, and [CVE-2022-41038](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41038>) could allow an attacker authenticated to SharePoint to execute arbitrary code on the server, provided the account has \u201cManage List\u201d permissions.\n\nMaxing out the CVSS base score with a 10.0 this month is [CVE-2022-37968](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-37968>), an Elevation of Privilege vulnerability in the Azure Arc-enabled Kubernetes cluster Connect component. It\u2019s unclear why Microsoft has assigned such a high score, given that an attacker would need to know the randomly generated external DNS endpoint for an Azure Arc-enabled Kubernetes cluster (arguably making the Attack Complexity \u201cHigh\u201d). That said, if this condition is met then an unauthenticated user could become a cluster admin and potentially gain control over the Kubernetes cluster. Users of Azure Arc and Azure Stack Edge should check whether auto-updates are turned on, and if not, upgrade manually as soon as possible.\n\n## Summary charts\n\n\n\n## Summary tables\n\n### Azure vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-37968](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37968>) | Azure Arc-enabled Kubernetes cluster Connect Elevation of Privilege Vulnerability | No | No | 10 | Yes \n[CVE-2022-38017](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38017>) | StorSimple 8000 Series Elevation of Privilege Vulnerability | No | No | 6.8 | Yes \n[CVE-2022-35829](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35829>) | Service Fabric Explorer Spoofing Vulnerability | No | No | 6.2 | Yes \n \n### Browser vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-41035](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41035>) | Microsoft Edge (Chromium-based) Spoofing Vulnerability | No | No | 8.3 | Yes \n[CVE-2022-3373](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3373>) | Chromium: CVE-2022-3373 Out of bounds write in V8 | No | No | N/A | Yes \n[CVE-2022-3370](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3370>) | Chromium: CVE-2022-3370 Use after free in Custom Elements | No | No | N/A | Yes \n[CVE-2022-3317](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3317>) | Chromium: CVE-2022-3317 Insufficient validation of untrusted input in Intents | No | No | N/A | Yes \n[CVE-2022-3316](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3316>) | Chromium: CVE-2022-3316 Insufficient validation of untrusted input in Safe Browsing | No | No | N/A | Yes \n[CVE-2022-3315](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3315>) | Chromium: CVE-2022-3315 Type confusion in Blink | No | No | N/A | Yes \n[CVE-2022-3313](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3313>) | Chromium: CVE-2022-3313 Incorrect security UI in Full Screen | No | No | N/A | Yes \n[CVE-2022-3311](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3311>) | Chromium: CVE-2022-3311 Use after free in Import | No | No | N/A | Yes \n[CVE-2022-3310](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3310>) | Chromium: CVE-2022-3310 Insufficient policy enforcement in Custom Tabs | No | No | N/A | Yes \n[CVE-2022-3308](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3308>) | Chromium: CVE-2022-3308 Insufficient policy enforcement in Developer Tools | No | No | N/A | Yes \n[CVE-2022-3307](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3307>) | Chromium: CVE-2022-3307 Use after free in Media | No | No | N/A | Yes \n[CVE-2022-3304](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-3304>) | Chromium: CVE-2022-3304 Use after free in CSS | No | No | N/A | Yes \n \n### Developer Tools vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-41034](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41034>) | Visual Studio Code Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-41083](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41083>) | Visual Studio Code Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-41032](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41032>) | NuGet Client Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-41042](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41042>) | Visual Studio Code Information Disclosure Vulnerability | No | No | 7.4 | Yes \n \n### Microsoft Office vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-41038](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41038>) | Microsoft SharePoint Server Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-41036](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41036>) | Microsoft SharePoint Server Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-41037](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41037>) | Microsoft SharePoint Server Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-38053](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38053>) | Microsoft SharePoint Server Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-41031](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41031>) | Microsoft Word Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-38048](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38048>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-38049](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38049>) | Microsoft Office Graphics Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-38001](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38001>) | Microsoft Office Spoofing Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-41043](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41043>) | Microsoft Office Information Disclosure Vulnerability | No | Yes | 3.3 | Yes \n \n### System Center vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-37971](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37971>) | Microsoft Windows Defender Elevation of Privilege Vulnerability | No | No | 7.1 | Yes \n \n### Windows vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-38016](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38016>) | Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-38045](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38045>) | Server Service Remote Protocol Elevation of Privilege Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-37984](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37984>) | Windows WLAN Service Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-38003](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38003>) | Windows Resilient File System Elevation of Privilege | No | No | 7.8 | Yes \n[CVE-2022-38028](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38028>) | Windows Print Spooler Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-38039](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38039>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37995](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37995>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37979](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37979>) | Windows Hyper-V Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37970](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37970>) | Windows DWM Core Library Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37980](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37980>) | Windows DHCP Client Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-38050](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38050>) | Win32k Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37983](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37983>) | Microsoft DWM Core Library Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37998](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37998>) | Windows Local Session Manager (LSM) Denial of Service Vulnerability | No | No | 7.7 | Yes \n[CVE-2022-37973](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37973>) | Windows Local Session Manager (LSM) Denial of Service Vulnerability | No | No | 7.7 | Yes \n[CVE-2022-38036](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38036>) | Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability | No | No | 7.5 | No \n[CVE-2022-38027](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38027>) | Windows Storage Elevation of Privilege Vulnerability | No | No | 7 | Yes \n[CVE-2022-38021](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38021>) | Connected User Experiences and Telemetry Elevation of Privilege Vulnerability | No | No | 7 | Yes \n[CVE-2022-37974](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37974>) | Windows Mixed Reality Developer Tools Information Disclosure Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-38046](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38046>) | Web Account Manager Information Disclosure Vulnerability | No | No | 6.2 | Yes \n[CVE-2022-37965](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37965>) | Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability | No | No | 5.9 | Yes \n[CVE-2022-37996](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37996>) | Windows Kernel Memory Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-38025](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38025>) | Windows Distributed File System (DFS) Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-38030](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38030>) | Windows USB Serial Driver Information Disclosure Vulnerability | No | No | 4.3 | Yes \n \n### Windows ESU vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-37982](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37982>) | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-38031](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38031>) | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-38040](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38040>) | Microsoft ODBC Driver Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-37976](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37976>) | Active Directory Certificate Services Elevation of Privilege Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-30198](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30198>) | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-22035](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22035>) | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-24504](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24504>) | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-33634](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33634>) | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-38047](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38047>) | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-38000](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38000>) | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-41081](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41081>) | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-37986](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37986>) | Windows Win32k Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37988](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37988>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-38037](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38037>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-38038](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38038>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37990](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37990>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37991](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37991>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37999](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37999>) | Windows Group Policy Preference Client Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37993](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37993>) | Windows Group Policy Preference Client Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37994](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37994>) | Windows Group Policy Preference Client Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37975](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37975>) | Windows Group Policy Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-38051](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38051>) | Windows Graphics Component Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37997](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37997>) | Windows Graphics Component Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-33635](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33635>) | Windows GDI+ Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37987](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37987>) | Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-37989](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37989>) | Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-41033](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41033>) | Windows COM+ Event System Service Elevation of Privilege Vulnerability | Yes | No | 7.8 | Yes \n[CVE-2022-38044](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38044>) | Windows CD-ROM File System Driver Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-33645](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33645>) | Windows TCP/IP Driver Denial of Service Vulnerability | No | No | 7.5 | No \n[CVE-2022-38041](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38041>) | Windows Secure Channel Denial of Service Vulnerability | No | No | 7.5 | No \n[CVE-2022-34689](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34689>) | Windows CryptoAPI Spoofing Vulnerability | No | No | 7.5 | Yes \n[CVE-2022-37978](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37978>) | Windows Active Directory Certificate Services Security Feature Bypass | No | No | 7.5 | Yes \n[CVE-2022-38042](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38042>) | Active Directory Domain Services Elevation of Privilege Vulnerability | No | No | 7.1 | Yes \n[CVE-2022-38029](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38029>) | Windows ALPC Elevation of Privilege Vulnerability | No | No | 7 | Yes \n[CVE-2022-38033](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38033>) | Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35770](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35770>) | Windows NTLM Spoofing Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-37977](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37977>) | Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability | No | No | 6.5 | No \n[CVE-2022-38032](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38032>) | Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability | No | No | 5.9 | Yes \n[CVE-2022-38043](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38043>) | Windows Security Support Provider Interface Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-37985](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37985>) | Windows Graphics Component Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-38026](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38026>) | Windows DHCP Client Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-38034](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38034>) | Windows Workstation Service Elevation of Privilege Vulnerability | No | No | 4.3 | Yes \n[CVE-2022-37981](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37981>) | Windows Event Logging Service Denial of Service Vulnerability | No | No | 4.3 | Yes \n[CVE-2022-38022](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38022>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 2.5 | Yes", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 10.0, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2022-10-11T18:35:28", "type": "rapid7blog", "title": "Patch Tuesday - October 2022", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2022-22035", "CVE-2022-24504", "CVE-2022-30198", "CVE-2022-3304", "CVE-2022-3307", "CVE-2022-3308", "CVE-2022-3310", "CVE-2022-3311", "CVE-2022-3313", "CVE-2022-3315", "CVE-2022-3316", "CVE-2022-3317", "CVE-2022-33634", "CVE-2022-33635", "CVE-2022-33645", "CVE-2022-3370", "CVE-2022-3373", "CVE-2022-34689", "CVE-2022-35770", "CVE-2022-35829", "CVE-2022-37965", "CVE-2022-37968", "CVE-2022-37970", "CVE-2022-37971", "CVE-2022-37973", "CVE-2022-37974", "CVE-2022-37975", "CVE-2022-37976", "CVE-2022-37977", "CVE-2022-37978", "CVE-2022-37979", "CVE-2022-37980", "CVE-2022-37981", "CVE-2022-37982", "CVE-2022-37983", "CVE-2022-37984", "CVE-2022-37985", "CVE-2022-37986", "CVE-2022-37987", "CVE-2022-37988", "CVE-2022-37989", "CVE-2022-37990", "CVE-2022-37991", "CVE-2022-37993", "CVE-2022-37994", "CVE-2022-37995", "CVE-2022-37996", "CVE-2022-37997", "CVE-2022-37998", "CVE-2022-37999", "CVE-2022-38000", "CVE-2022-38001", "CVE-2022-38003", "CVE-2022-38016", "CVE-2022-38017", "CVE-2022-38021", "CVE-2022-38022", "CVE-2022-38025", "CVE-2022-38026", "CVE-2022-38027", "CVE-2022-38028", "CVE-2022-38029", "CVE-2022-38030", "CVE-2022-38031", "CVE-2022-38032", "CVE-2022-38033", "CVE-2022-38034", "CVE-2022-38036", "CVE-2022-38037", "CVE-2022-38038", "CVE-2022-38039", "CVE-2022-38040", "CVE-2022-38041", "CVE-2022-38042", "CVE-2022-38043", "CVE-2022-38044", "CVE-2022-38045", "CVE-2022-38046", "CVE-2022-38047", "CVE-2022-38048", "CVE-2022-38049", "CVE-2022-38050", "CVE-2022-38051", "CVE-2022-38053", "CVE-2022-41031", "CVE-2022-41032", "CVE-2022-41033", "CVE-2022-41034", "CVE-2022-41035", "CVE-2022-41036", "CVE-2022-41037", "CVE-2022-41038", "CVE-2022-41040", "CVE-2022-41042", "CVE-2022-41043", "CVE-2022-41081", "CVE-2022-41082", "CVE-2022-41083"], "modified": "2022-10-11T18:35:28", "id": "RAPID7BLOG:B37CF2E44EB6AA38B417BB09297CD3E1", "href": "https://blog.rapid7.com/2022/10/11/patch-tuesday-october-2022/", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-09T18:00:08", "description": "\n\nMicrosoft is offering fixes for 114 vulnerabilities for [April 2023 Patch Tuesday](<https://msrc.microsoft.com/update-guide/releaseNote/2023-Apr>). This month\u2019s haul includes a single zero-day vulnerability, as well as seven critical Remote Code Execution (RCE) vulnerabilities. There is a strong focus on fixes for Windows OS this month.\n\n### Zero-day vulnerability: CLFS\n\nOver the last 18 months or so, Rapid7 has written [several times](<https://www.rapid7.com/search/?q=%22driver-based%22&page=1&facets=facetcat_blog>) about the prevalence of driver-based attacks. This month's sole zero-day vulnerability \u2013 a driver-based elevation of privilege \u2013 will only reinforce the popularity of the vector among threat actors. Successful exploitation of [CVE-2023-28252](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28252>) allows an attacker to obtain SYSTEM privileges via a vulnerability in the Windows Common Log File System (CLFS) driver. Microsoft has patched more than one similar CLFS driver vulnerability over the past year, including [CVE-2023-23376](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23376>) in February 2023 and [CVE-2022-37969](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37969>) in September 2022.\n\nMicrosoft has released patches for the zero-day vulnerability [CVE-2023-28252](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28252>) for all current versions of Windows. Microsoft is not aware of public disclosure, but has detected in-the-wild exploitation and is aware of functional exploit code. The assigned base CVSSv3 score of 7.8 lands this vulnerability near the top of the High severity range, which is expected since it gives complete control of an asset, but a remote attacker must first find some other method to access the target.\n\n### Critical RCE: MSQS, Raw Image Extension, DHCP etc.\n\nApril 2023 also sees 45 separate Remote Code Execution (RCE) vulnerabilities patched, which is a significant uptick from the average of 33 per month over the past three months.\n\nMicrosoft rates seven of this month\u2019s RCE vulnerabilities as Critical, including two related vulnerabilities with a CVSSv3 base score of 9.8. [CVE-2023-28250](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28250>) describes a vulnerability in Windows Pragmatic General Multicast (PGM) which allows an attacker to achieve RCE by sending a specially crafted file over the network. [CVE-2023-21554](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21554>) allows an attacker to achieve RCE by sending a specially crafted Microsoft Messaging Queue packet. In both cases, the Microsoft Message Queueing Service must be enabled and listening on port 1801 for an asset to be vulnerable. The Message Queueing Service is not installed by default. Even so, Microsoft considers exploitation of CVE-2023-21554 more likely.\n\nThe other five Critical RCE this month are spread across various Windows components: Windows Raw Image Extension, Windows DHCP Protocol, and two frequent fliers: Windows Point-to-Point Tunneling Protocol and the Windows Layer 2 Tunneling Protocol.\n\nThe RAW Image Extension vulnerability [CVE-2023-28921](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28291>) is another example of what Microsoft refers to as an Arbitrary Code Execution (ACE), explaining \u201cThe attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.\u201d For some defenders, this may stretch the definition of the word Remote in Remote Code Execution, but there are many ways to deliver a file to a user, and an unpatched system remains vulnerable regardless.\n\nDHCP server vulnerability [CVE-2023-28231](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28231>) requires an attacker to be on the same network as the target, but offers RCE via a specially crafted RPC call. Microsoft considers that exploitation is more likely.\n\n### Defender: Denial-of-Service\n\nThe hunter becomes the hunted as Microsoft patches a Denial of Service vulnerability in Defender. The advisory for [CVE-2023-24860](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-24860>) includes some unusual guidance: \u201cSystems that have disabled Microsoft Defender are not in an exploitable state.\u201d In practice this vulnerability is less likely to be exploited, and the default update cadence for Defender should mean that most assets are automatically patched in a short timeframe.\n\n### Windows Server: remote kernel memory disclosure\n\nWindows Server administrators should take note of [CVE-2023-28247](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28247>). Successful exploitation allows an attacker to view contents of kernel memory remotely from the context of a user process. Microsoft lists Windows Server 2012, 2016, 2019, and 2022 as vulnerable. Although Microsoft assesses that exploitation is less likely, Windows stores many secrets in kernel memory, including cryptographic keys.\n\n### Active Directory Certificate Services: tighter Kerberos authentication\n\nBack in May 2022, Microsoft publicized a trio of related Elevation of Privilege vulnerabilities affecting the Key Distribution Center (KDC) via Kerberos: [CVE-2022-26923](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26923>) (aka Certifried), [CVE-2022-26931](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26931>), and [CVE-2022-34691](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34691>). Insufficient validation allowed certificate spoofing under certain circumstances. The April 2023 security updates introduce further relevant changes.\n\nThe May 2022 patches for all affected versions of Windows introduced a [two-tiered remediation for this trio of vulnerabilities](<https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16>):\n\n * Full Enforcement mode: require strong mapping for certificates, otherwise authentication is denied. Microsoft intends to make this the default setting by November 2023.\n * Compatibility mode: some allowance for weak mapping of certificates, but old certificates will still result in denial. This has been the default behaviour since May 2022.\n\nMicrosoft provided a time-limited ability to disable this security remediation entirely using a [registry key](<https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16#bkmk_kdcregkey>). Although none of these vulnerabilities are listed in Microsoft's [April 2023 Security Updates Release Notes](<https://msrc.microsoft.com/update-guide/releaseNote/2023-Apr>), administrators should note that Windows assets with the April 2023 updates installed will now ignore the registry key which previously disabled these certificate mapping checks. Microsoft provides [guidance](<https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16#ID0EDT>) to administrators concerned with the balance of usability vs. security.\n\nIn addition to detection of vulnerable assets via InsightVM, Rapid7 offers a [Metasploit module](<https://www.rapid7.com/blog/post/2023/01/30/metasploit-framework-6-3-released/#newinmetasploit63>) allowing fully-automated privilege escalation using the Certifried vulnerability, as well as a [thorough AttackerKB analysis](<https://attackerkb.com/topics/iigmLeSKp1/cve-2022-26923-aka-certifried>).\n\n### Azure: information disclosure and security bypass\n\nMachine learning is everywhere these days, and this month\u2019s Patch Tuesday is no exception: [CVE-2023-28312](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28312>) describes a vulnerability in Azure Machine Learning which allows an attacker to access system logs, although any attack would need to be launched from within the same secure network. The [advisory](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28312>) contains links to Microsoft detection and remediation guidance.\n\nThe other Azure vulnerability this month is a Azure Service Connector Security Feature Bypass. Microsoft rates Attack Complexity for [CVE-2023-28300](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28300>) as High, since this vulnerability is only useful when chained with other exploits to defeat other security measures. However, the Azure Service Connector only updates when the Azure Command-Line Interface is updated, and automatic updates are not enabled by default.\n\n### End-of-life: the class of 2013\n\nFinal curtain call tonight for a raft of familiar names, since April 2023 Patch Tuesday includes the very last round of Extended Security Updates (ESU) for a number of Microsoft products. These include:\n\n * [Exchange Server 2013](<https://learn.microsoft.com/en-us/lifecycle/products/exchange-server-2013>).\n * [Lync Server 2013](<https://learn.microsoft.com/en-us/lifecycle/products/microsoft-lync-server-2013>).\n * [Office 2013](<https://learn.microsoft.com/en-us/lifecycle/products/microsoft-office-2013>) and individual component applications such as [Excel 2013](<https://learn.microsoft.com/lifecycle/products/excel-2013>), [PowerPoint 2013](<https://learn.microsoft.com/lifecycle/products/powerpoint-2013>) etc.\n * [Project 2013](<https://learn.microsoft.com/en-us/lifecycle/products/project-2013>) and [Project Server 2013](<https://learn.microsoft.com/lifecycle/products/project-server-2013>).\n * [SharePoint Server 2013](<https://learn.microsoft.com/en-us/lifecycle/products/sharepoint-server-2013>) and [SharePoint Foundation 2013](<https://learn.microsoft.com/en-us/lifecycle/products/sharepoint-foundation-2013>).\n * [Skype for Business 2015](<https://learn.microsoft.com/lifecycle/products/skype-for-business-2015>); the 2016 edition is still in ESU until October 2025.\n\nAs always, the end of ESU means that Microsoft does not expect to patch or even disclose any future vulnerabilities which might emerge in these venerable software products, so it is no longer possible to secure them; these dates have been well-publicized far in advance under the fixed lifecycle policy. No vendor can feasibly support ancient software indefinitely, and some administrators may be glad that they will never have to install another Exchange Server 2013 patch.\n\n## Summary Charts\n\nPrinter Drivers, DNS, and the Windows Kernel.Remote Code Execution and Elevation of Privilege account for the majority as usual. A rare appearance for Tampering.CVSSv3 scoring tends to cluster around certain values.As usual, the distribution of severity skews towards Very Important.Printer drivers and CVEs go hand in hand.\n\n## Summary tables\n\n### Azure vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-28300](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28300>) | Azure Service Connector Security Feature Bypass Vulnerability | No | No | 7.5 \n[CVE-2023-28312](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28312>) | Azure Machine Learning Information Disclosure Vulnerability | No | No | 6.5 \n \n### Browser vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-28284](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28284>) | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | No | No | 4.3 \n[CVE-2023-28301](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28301>) | Microsoft Edge (Chromium-based) Tampering Vulnerability | No | No | 4.2 \n[CVE-2023-24935](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24935>) | Microsoft Edge (Chromium-based) Spoofing Vulnerability | No | No | N/A \n[CVE-2023-1823](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1823>) | Chromium: CVE-2023-1823 Inappropriate implementation in FedCM | No | No | N/A \n[CVE-2023-1822](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1822>) | Chromium: CVE-2023-1822 Incorrect security UI in Navigation | No | No | N/A \n[CVE-2023-1821](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1821>) | Chromium: CVE-2023-1821 Inappropriate implementation in WebShare | No | No | N/A \n[CVE-2023-1820](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1820>) | Chromium: CVE-2023-1820 Heap buffer overflow in Browser History | No | No | N/A \n[CVE-2023-1819](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1819>) | Chromium: CVE-2023-1819 Out of bounds read in Accessibility | No | No | N/A \n[CVE-2023-1818](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1818>) | Chromium: CVE-2023-1818 Use after free in Vulkan | No | No | N/A \n[CVE-2023-1817](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1817>) | Chromium: CVE-2023-1817 Insufficient policy enforcement in Intents | No | No | N/A \n[CVE-2023-1816](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1816>) | Chromium: CVE-2023-1816 Incorrect security UI in Picture In Picture | No | No | N/A \n[CVE-2023-1815](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1815>) | Chromium: CVE-2023-1815 Use after free in Networking APIs | No | No | N/A \n[CVE-2023-1814](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1814>) | Chromium: CVE-2023-1814 Insufficient validation of untrusted input in Safe Browsing | No | No | N/A \n[CVE-2023-1813](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1813>) | Chromium: CVE-2023-1813 Inappropriate implementation in Extensions | No | No | N/A \n[CVE-2023-1812](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1812>) | Chromium: CVE-2023-1812 Out of bounds memory access in DOM Bindings | No | No | N/A \n[CVE-2023-1811](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1811>) | Chromium: CVE-2023-1811 Use after free in Frames | No | No | N/A \n[CVE-2023-1810](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-1810>) | Chromium: CVE-2023-1810 Heap buffer overflow in Visuals | No | No | N/A \n \n### Developer Tools vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-28296](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28296>) | Visual Studio Remote Code Execution Vulnerability | No | No | 8.4 \n[CVE-2023-28262](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28262>) | Visual Studio Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-24893](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24893>) | Visual Studio Code Remote Code Execution Vulnerability | No | No | 7.8 \n[CVE-2023-28260](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28260>) | .NET DLL Hijacking Remote Code Execution Vulnerability | No | No | 7.8 \n[CVE-2023-28299](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28299>) | Visual Studio Spoofing Vulnerability | No | No | 5.5 \n[CVE-2023-28263](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28263>) | Visual Studio Information Disclosure Vulnerability | No | No | 5.5 \n \n### ESU SQL Server vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-23384](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23384>) | Microsoft SQL Server Remote Code Execution Vulnerability | No | No | 7.3 \n \n### ESU Windows vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-28250](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28250>) | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | No | No | 9.8 \n[CVE-2023-21554](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21554>) | Microsoft Message Queuing Remote Code Execution Vulnerability | No | No | 9.8 \n[CVE-2023-28240](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28240>) | Windows Network Load Balancing Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-21727](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21727>) | Remote Procedure Call Runtime Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-28275](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28275>) | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-28231](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28231>) | DHCP Server Service Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-28244](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28244>) | Windows Kerberos Elevation of Privilege Vulnerability | No | No | 8.1 \n[CVE-2023-28268](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28268>) | Netlogon RPC Elevation of Privilege Vulnerability | No | No | 8.1 \n[CVE-2023-28219](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28219>) | Layer 2 Tunneling Protocol Remote Code Execution Vulnerability | No | No | 8.1 \n[CVE-2023-28220](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28220>) | Layer 2 Tunneling Protocol Remote Code Execution Vulnerability | No | No | 8.1 \n[CVE-2023-28272](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28272>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-28293](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28293>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-24912](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24912>) | Windows Graphics Component Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-28252](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28252>) | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Yes | No | 7.8 \n[CVE-2023-28241](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28241>) | Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability | No | No | 7.5 \n[CVE-2023-24931](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24931>) | Windows Secure Channel Denial of Service Vulnerability | No | No | 7.5 \n[CVE-2023-28232](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28232>) | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | No | No | 7.5 \n[CVE-2023-28217](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28217>) | Windows Network Address Translation (NAT) Denial of Service Vulnerability | No | No | 7.5 \n[CVE-2023-28238](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28238>) | Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability | No | No | 7.5 \n[CVE-2023-28227](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28227>) | Windows Bluetooth Driver Remote Code Execution Vulnerability | No | No | 7.5 \n[CVE-2023-21769](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21769>) | Microsoft Message Queuing Denial of Service Vulnerability | No | No | 7.5 \n[CVE-2023-28302](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28302>) | Microsoft Message Queuing Denial of Service Vulnerability | No | No | 7.5 \n[CVE-2023-28254](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28254>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 7.2 \n[CVE-2023-28222](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28222>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.1 \n[CVE-2023-28229](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28229>) | Windows CNG Key Isolation Service Elevation of Privilege Vulnerability | No | No | 7 \n[CVE-2023-28218](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28218>) | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | No | No | 7 \n[CVE-2023-28216](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28216>) | Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability | No | No | 7 \n[CVE-2023-28305](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28305>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 6.6 \n[CVE-2023-28255](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28255>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 6.6 \n[CVE-2023-28278](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28278>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 6.6 \n[CVE-2023-28256](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28256>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 6.6 \n[CVE-2023-28306](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28306>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 6.6 \n[CVE-2023-28307](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28307>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 6.6 \n[CVE-2023-28308](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28308>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 6.6 \n[CVE-2023-28223](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28223>) | Windows Domain Name Service Remote Code Execution Vulnerability | No | No | 6.6 \n[CVE-2023-28267](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28267>) | Remote Desktop Protocol Client Information Disclosure Vulnerability | No | No | 6.5 \n[CVE-2023-28228](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28228>) | Windows Spoofing Vulnerability | No | No | 5.5 \n[CVE-2023-28271](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28271>) | Windows Kernel Memory Information Disclosure Vulnerability | No | No | 5.5 \n[CVE-2023-28253](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28253>) | Windows Kernel Information Disclosure Vulnerability | No | No | 5.5 \n[CVE-2023-28298](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28298>) | Windows Kernel Denial of Service Vulnerability | No | No | 5.5 \n[CVE-2023-28266](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28266>) | Windows Common Log File System Driver Information Disclosure Vulnerability | No | No | 5.5 \n[CVE-2023-28276](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28276>) | Windows Group Policy Security Feature Bypass Vulnerability | No | No | 4.4 \n[CVE-2023-21729](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21729>) | Remote Procedure Call Runtime Information Disclosure Vulnerability | No | No | 4.3 \n \n### Microsoft Dynamics vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-28309](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28309>) | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | No | No | 7.6 \n[CVE-2023-28313](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28313>) | Microsoft Dynamics 365 Customer Voice Cross-Site Scripting Vulnerability | No | No | 6.1 \n[CVE-2023-28314](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28314>) | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | No | No | 6.1 \n \n### Microsoft Office vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-28311](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28311>) | Microsoft Word Remote Code Execution Vulnerability | No | No | 7.8 \n[CVE-2023-28287](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28287>) | Microsoft Publisher Remote Code Execution Vulnerability | No | No | 7.8 \n[CVE-2023-28295](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28295>) | Microsoft Publisher Remote Code Execution Vulnerability | No | No | 7.8 \n[CVE-2023-28285](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28285>) | Microsoft Office Graphics Remote Code Execution Vulnerability | No | No | 7.8 \n[CVE-2023-28288](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28288>) | Microsoft SharePoint Server Spoofing Vulnerability | No | No | 6.5 \n \n### SQL Server vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-23375](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-23375>) | Microsoft ODBC and OLE DB Remote Code Execution Vulnerability | No | No | 7.8 \n[CVE-2023-28304](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28304>) | Microsoft ODBC and OLE DB Remote Code Execution Vulnerability | No | No | 7.8 \n \n### System Center vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-24860](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24860>) | Microsoft Defender Denial of Service Vulnerability | No | No | 7.5 \n \n### Windows vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score \n---|---|---|---|--- \n[CVE-2023-28297](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28297>) | Windows Remote Procedure Call Service (RPCSS) Elevation of Privilege Vulnerability | No | No | 8.8 \n[CVE-2023-24924](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24924>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24925](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24925>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24884](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24884>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24926](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24926>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24885](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24885>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24927](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24927>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24886](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24886>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24928](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24928>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24887](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24887>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-24929](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24929>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-28243](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28243>) | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | No | No | 8.8 \n[CVE-2023-28291](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28291>) | Raw Image Extension Remote Code Execution Vulnerability | No | No | 8.4 \n[CVE-2023-28274](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28274>) | Windows Win32k Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-28246](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28246>) | Windows Registry Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-28225](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28225>) | Windows NTLM Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-28237](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28237>) | Windows Kernel Remote Code Execution Vulnerability | No | No | 7.8 \n[CVE-2023-28236](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28236>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-28248](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28248>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 \n[CVE-2023-28292](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28292>) | Raw Image Extension Remote Code Execution Vulnerability | No | No | 7.8 \n[CVE-2023-28233](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28233>) | Windows Secure Channel Denial of Service Vulnerability | No | No | 7.5 \n[CVE-2023-28234](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28234>) | Windows Secure Channel Denial of Service Vulnerability | No | No | 7.5 \n[CVE-2023-28247](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28247>) | Windows Network File System Information Disclosure Vulnerability | No | No | 7.5 \n[CVE-2023-28224](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28224>) | Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability | No | No | 7.1 \n[CVE-2023-28221](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28221>) | Windows Error Reporting Service Elevation of Privilege Vulnerability | No | No | 7 \n[CVE-2023-28273](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28273>) | Windows Clip Service Elevation of Privilege Vulnerability | No | No | 7 \n[CVE-2023-24914](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24914>) | Win32k Elevation of Privilege Vulnerability | No | No | 7 \n[CVE-2023-28235](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28235>) | Windows Lock Screen Security Feature Bypass Vulnerability | No | No | 6.8 \n[CVE-2023-28270](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28270>) | Windows Lock Screen Security Feature Bypass Vulnerability | No | No | 6.8 \n[CVE-2023-24883](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24883>) | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | No | No | 6.5 \n[CVE-2023-28269](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28269>) | Windows Boot Manager Security Feature Bypass Vulnerability | No | No | 6.2 \n[CVE-2023-28249](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28249>) | Windows Boot Manager Security Feature Bypass Vulnerability | No | No | 6.2 \n[CVE-2023-28226](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28226>) | Windows Enroll Engine Security Feature Bypass Vulnerability | No | No | 5.3 \n[CVE-2023-28277](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28277>) | Windows DNS Server Information Disclosure Vulnerability | No | No | 4.9", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-04-11T22:49:56", "type": "rapid7blog", "title": "Patch Tuesday - April 2023", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-26923", "CVE-2022-26931", "CVE-2022-34691", "CVE-2022-37969", "CVE-2023-1810", "CVE-2023-1811", "CVE-2023-1812", "CVE-2023-1813", "CVE-2023-1814", "CVE-2023-1815", "CVE-2023-1816", "CVE-2023-1817", "CVE-2023-1818", "CVE-2023-1819", "CVE-2023-1820", "CVE-2023-1821", "CVE-2023-1822", "CVE-2023-1823", "CVE-2023-21554", "CVE-2023-21727", "CVE-2023-21729", "CVE-2023-21769", "CVE-2023-23375", "CVE-2023-23376", "CVE-2023-23384", "CVE-2023-24860", "CVE-2023-24883", "CVE-2023-24884", "CVE-2023-24885", "CVE-2023-24886", "CVE-2023-24887", "CVE-2023-24893", "CVE-2023-24912", "CVE-2023-24914", "CVE-2023-24924", "CVE-2023-24925", "CVE-2023-24926", "CVE-2023-24927", "CVE-2023-24928", "CVE-2023-24929", "CVE-2023-24931", "CVE-2023-24935", "CVE-2023-28216", "CVE-2023-28217", "CVE-2023-28218", "CVE-2023-28219", "CVE-2023-28220", "CVE-2023-28221", "CVE-2023-28222", "CVE-2023-28223", "CVE-2023-28224", "CVE-2023-28225", "CVE-2023-28226", "CVE-2023-28227", "CVE-2023-28228", "CVE-2023-28229", "CVE-2023-28231", "CVE-2023-28232", "CVE-2023-28233", "CVE-2023-28234", "CVE-2023-28235", "CVE-2023-28236", "CVE-2023-28237", "CVE-2023-28238", "CVE-2023-28240", "CVE-2023-28241", "CVE-2023-28243", "CVE-2023-28244", "CVE-2023-28246", "CVE-2023-28247", "CVE-2023-28248", "CVE-2023-28249", "CVE-2023-28250", "CVE-2023-28252", "CVE-2023-28253", "CVE-2023-28254", "CVE-2023-28255", "CVE-2023-28256", "CVE-2023-28260", "CVE-2023-28262", "CVE-2023-28263", "CVE-2023-28266", "CVE-2023-28267", "CVE-2023-28268", "CVE-2023-28269", "CVE-2023-28270", "CVE-2023-28271", "CVE-2023-28272", "CVE-2023-28273", "CVE-2023-28274", "CVE-2023-28275", "CVE-2023-28276", "CVE-2023-28277", "CVE-2023-28278", "CVE-2023-28284", "CVE-2023-28285", "CVE-2023-28287", "CVE-2023-28288", "CVE-2023-28291", "CVE-2023-28292", "CVE-2023-28293", "CVE-2023-28295", "CVE-2023-28296", "CVE-2023-28297", "CVE-2023-28298", "CVE-2023-28299", "CVE-2023-28300", "CVE-2023-28301", "CVE-2023-28302", "CVE-2023-28304", "CVE-2023-28305", "CVE-2023-28306", "CVE-2023-28307", "CVE-2023-28308", "CVE-2023-28309", "CVE-2023-28311", "CVE-2023-28312", "CVE-2023-28313", "CVE-2023-28314", "CVE-2023-28921"], "modified": "2023-04-11T22:49:56", "id": "RAPID7BLOG:25D6D15A7AF3BD5A697AFA65A7738391", "href": "https://blog.rapid7.com/2023/04/11/patch-tuesday-april-2023/", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2023-06-05T14:28:18", "description": "Windows Digital Media Receiver Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35746", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35746"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35746", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35746", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:31:19", "description": "Windows Bluetooth Driver Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-35820", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35820"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2022-35820", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35820", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-06-05T14:28:17", "description": "HTTP.sys Denial of Service Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35748", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35748"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35748", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35748", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:28:16", "description": "Unified Write Filter Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 0.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 6.7, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35754", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 2.5, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.0, "vectorString": "AV:L/AC:L/Au:M/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "MULTIPLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35754"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35754", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35754", "cvss": {"score": 4.0, "vector": "AV:L/AC:L/Au:M/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:31:25", "description": "Windows Error Reporting Service Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-35795", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35795"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2022-35795", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35795", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-06-05T14:28:15", "description": "Windows Kernel Memory Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35758", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35758"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35758", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35758", "cvss": {"score": 1.7, "vector": "AV:L/AC:L/Au:S/C:P/I:N/A:N"}, "cpe23": []}, {"lastseen": "2023-06-05T14:31:30", "description": "Microsoft ATA Port Driver Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-35760", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35760"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2022-35760", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35760", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-06-05T14:28:20", "description": "Windows Local Security Authority (LSA) Denial of Service Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35759", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35759"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35759", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35759", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:28:16", "description": "Windows Kerberos Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35756", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35756"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35756", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35756", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:28:17", "description": "Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35747", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35747"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35747", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35747", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:N/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:31:28", "description": "Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-35769", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35769"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2022-35769", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35769", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-06-05T14:31:36", "description": "Windows Partition Management Driver Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-33670", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-33670"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2012:-"], "id": "CVE-2022-33670", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33670", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-05T14:31:32", "description": "Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-34706", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34706"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2008:r2"], "id": "CVE-2022-34706", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34706", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-05T14:31:34", "description": "Windows Fax Service Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.1, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-34690", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 3.2, "vectorString": "AV:L/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34690"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2008:r2"], "id": "CVE-2022-34690", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34690", "cvss": {"score": 3.2, "vector": "AV:L/AC:L/Au:S/C:N/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"]}, {"lastseen": "2023-06-05T14:31:33", "description": "Windows Kernel Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-34708", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34708"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2008:r2"], "id": "CVE-2022-34708", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34708", "cvss": {"score": 1.7, "vector": "AV:L/AC:L/Au:S/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-05T14:28:18", "description": "Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35744", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35744"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35744", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35744", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:28:17", "description": "Windows Hyper-V Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35751", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 1.5, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:L/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35751"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35751", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35751", "cvss": {"score": 3.5, "vector": "AV:L/AC:H/Au:S/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:31:29", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-35767", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35767"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2022-35767", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35767", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-06-05T14:31:29", "description": "Windows Kernel Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-35768", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35768"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2022-35768", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35768", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-06-05T14:28:18", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35745", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35745"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35745", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35745", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:28:15", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35753", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35753"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35753", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35753", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:28:18", "description": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35743", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35743"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35743", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35743", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:28:16", "description": "Win32k Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35750", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35750"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35750", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35750", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:28:16", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35752", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35752"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35752", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35752", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:31:36", "description": "Windows WebBrowser Control Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-30194", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30194"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2008:r2"], "id": "CVE-2022-30194", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30194", "cvss": {"score": 4.6, "vector": "AV:N/AC:H/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"]}, {"lastseen": "2023-06-05T14:28:16", "description": "Windows Digital Media Receiver Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-05-31T19:15:00", "type": "cve", "title": "CVE-2022-35749", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35749"], "modified": "2023-06-01T01:17:00", "cpe": [], "id": "CVE-2022-35749", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35749", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2023-06-05T14:31:29", "description": "Windows Print Spooler Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.3, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.3, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-35793", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 2.7, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.1, "vectorString": "AV:L/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35793"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2022-35793", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35793", "cvss": {"score": 4.1, "vector": "AV:L/AC:M/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-06-05T14:31:33", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-34714", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34714"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2022-34714", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34714", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-06-05T14:31:32", "description": "Windows Kernel Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-34707", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34707"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2008:r2"], "id": "CVE-2022-34707", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34707", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-05T14:31:35", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-34701", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34701"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2008:r2"], "id": "CVE-2022-34701", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34701", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-05T14:31:37", "description": "Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-30133", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2008:r2"], "id": "CVE-2022-30133", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30133", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"]}, {"lastseen": "2023-06-05T14:31:35", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-34702", "cwe": ["CWE-362"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34702"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2008:r2"], "id": "CVE-2022-34702", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34702", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*"]}, {"lastseen": "2023-06-05T14:31:34", "description": "Active Directory Domain Services Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-34691", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34691"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2008:r2"], "id": "CVE-2022-34691", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34691", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"]}, {"lastseen": "2023-06-05T14:31:31", "description": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "cve", "title": "CVE-2022-34713", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34713"], "modified": "2023-05-31T19:15:00", "cpe": ["cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2022-34713", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34713", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*"]}, {"lastseen": "2023-06-03T14:48:08", "description": "Windows CryptoAPI Spoofing Vulnerability.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-10-11T19:15:00", "type": "cve", "title": "CVE-2022-34689", "cwe": ["CWE-290"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34689"], "modified": "2022-10-12T14:44:00", "cpe": ["cpe:/o:microsoft:windows_server_2022:-", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_11:-", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_10:21h2", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2022-34689", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-34689", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*"]}], "mscve": [{"lastseen": "2023-06-05T14:59:01", "description": "Windows Digital Media Receiver Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Digital Media Receiver Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35746"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35746", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35746", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:58:44", "description": "Windows Bluetooth Driver Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Bluetooth Driver Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35820"], "modified": "2022-08-19T07:00:00", "id": "MS:CVE-2022-35820", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35820", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:01", "description": "HTTP.sys Denial of Service Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "HTTP.sys Denial of Service Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35748"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35748", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35748", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-06-05T14:59:00", "description": "Unified Write Filter Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 0.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 6.7, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Unified Write Filter Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 2.5, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.0, "vectorString": "AV:L/AC:L/Au:M/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "MULTIPLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35754"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35754", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35754", "cvss": {"score": 4.0, "vector": "AV:L/AC:L/Au:M/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:58:51", "description": "Windows Error Reporting Service Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Error Reporting Service Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35795"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35795", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35795", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:58:59", "description": "Microsoft ATA Port Driver Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Microsoft ATA Port Driver Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35760"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35760", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35760", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:58:59", "description": "Windows Kernel Memory Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Kernel Memory Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35758"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35758", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35758", "cvss": {"score": 1.7, "vector": "AV:L/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2023-06-05T14:58:59", "description": "Windows Local Security Authority (LSA) Denial of Service Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Local Security Authority (LSA) Denial of Service Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35759"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35759", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35759", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2023-06-05T14:59:00", "description": "Windows Kerberos Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Kerberos Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35756"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35756", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35756", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:01", "description": "Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35747"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35747", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35747", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-06-05T14:58:51", "description": "Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35769"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35769", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35769", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-06-05T14:59:06", "description": "Windows Partition Management Driver Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Partition Management Driver Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-33670"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-33670", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-33670", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:04", "description": "Windows Kernel Information Disclosure Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Kernel Information Disclosure Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34708"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-34708", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34708", "cvss": {"score": 1.7, "vector": "AV:L/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2023-06-05T14:59:04", "description": "Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34706"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-34706", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34706", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:58:55", "description": "Windows Fax Service Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.1, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.2}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Fax Service Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 3.2, "vectorString": "AV:L/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34690"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-34690", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34690", "cvss": {"score": 3.2, "vector": "AV:L/AC:L/Au:S/C:N/I:P/A:P"}}, {"lastseen": "2023-06-05T14:58:51", "description": "Windows Kernel Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Kernel Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35768"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35768", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35768", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:00", "description": "Windows Hyper-V Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Hyper-V Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "LOW", "exploitabilityScore": 1.5, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:L/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35751"], "modified": "2022-08-19T07:00:00", "id": "MS:CVE-2022-35751", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35751", "cvss": {"score": 3.5, "vector": "AV:L/AC:H/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:02", "description": "Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35744"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35744", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35744", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:58:52", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35767"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35767", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35767", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:00", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35753"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35753", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35753", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:02", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35745"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35745", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35745", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:01", "description": "Win32k Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Win32k Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35750"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35750", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35750", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:00", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35752"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35752", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35752", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:06", "description": "Windows WebBrowser Control Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows WebBrowser Control Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30194"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-30194", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30194", "cvss": {"score": 4.6, "vector": "AV:N/AC:H/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:02", "description": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35743"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35743", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35743", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:58:51", "description": "Windows Print Spooler Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.3, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.3, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Print Spooler Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 2.7, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.1, "vectorString": "AV:L/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35793"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35793", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35793", "cvss": {"score": 4.1, "vector": "AV:L/AC:M/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:01", "description": "Windows Digital Media Receiver Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Digital Media Receiver Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35749"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35749", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35749", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:03", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34714"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-34714", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34714", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:04", "description": "Windows Kernel Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Kernel Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34707"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-34707", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34707", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:58:54", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34701"], "modified": "2022-09-20T07:00:00", "id": "MS:CVE-2022-34701", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34701", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-06-05T14:59:07", "description": "Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-30133", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30133", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:58:54", "description": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.1, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34702"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-34702", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34702", "cvss": {"score": 5.1, "vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T14:59:04", "description": "Active Directory Domain Services Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Active Directory Domain Services Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34691"], "modified": "2022-08-30T07:00:00", "id": "MS:CVE-2022-34691", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34691", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-03T14:58:43", "description": "Windows CryptoAPI Spoofing Vulnerability.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-10-11T07:00:00", "type": "mscve", "title": "Windows CryptoAPI Spoofing Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34689"], "modified": "2022-10-11T07:00:00", "id": "MS:CVE-2022-34689", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34689", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2023-06-05T14:59:03", "description": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30190", "CVE-2022-34713"], "modified": "2022-08-10T07:00:00", "id": "MS:CVE-2022-34713", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34713", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "zdi": [{"lastseen": "2023-06-05T17:43:32", "description": "This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the bthport.sys driver. The issue results from improper authorization logic when accessing registry keys. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-18T00:00:00", "type": "zdi", "title": "(Pwn2Own) Microsoft Windows bthport Driver Improper Authorization Local Privilege Escalation Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35820"], "modified": "2022-08-18T00:00:00", "id": "ZDI-22-1068", "href": "https://www.zerodayinitiative.com/advisories/ZDI-22-1068/", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T17:43:30", "description": "This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the partmgr.sys driver. The issue results from improper authorization logic when accessing SCSI file handles. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-18T00:00:00", "type": "zdi", "title": "(Pwn2Own) Microsoft Windows partmgr Improper Authorization Privilege Escalation Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-33670"], "modified": "2022-08-18T00:00:00", "id": "ZDI-22-1071", "href": "https://www.zerodayinitiative.com/advisories/ZDI-22-1071/", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T17:43:30", "description": "This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the vhdmp.sys driver. The issue results from improper authorization logic when accessing VHD files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2022-08-18T00:00:00", "type": "zdi", "title": "(Pwn2Own) Microsoft Windows vhdmp Driver Improper Authorization Privilege Escalation Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 1.5, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:L/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35751"], "modified": "2022-08-18T00:00:00", "id": "ZDI-22-1070", "href": "https://www.zerodayinitiative.com/advisories/ZDI-22-1070/", "cvss": {"score": 3.5, "vector": "AV:L/AC:H/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T17:43:28", "description": "This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of bitmap objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-18T00:00:00", "type": "zdi", "title": "Microsoft Windows win32kfull Bitmap Use-After-Free Local Privilege Escalation Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35750"], "modified": "2022-08-18T00:00:00", "id": "ZDI-22-1075", "href": "https://www.zerodayinitiative.com/advisories/ZDI-22-1075/", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T17:43:31", "description": "This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the cdd.dll driver. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-18T00:00:00", "type": "zdi", "title": "(Pwn2Own) Microsoft Windows cdd Driver Memory Corruption Privilege Escalation Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35750"], "modified": "2022-08-18T00:00:00", "id": "ZDI-22-1069", "href": "https://www.zerodayinitiative.com/advisories/ZDI-22-1069/", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T17:43:29", "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of certain image file types, such as SVG, that can contain script tags. Under limited circumstances, crafted data in an image can lead to execution of untrusted script. An attacker can leverage this vulnerability to execute code in the context of the current process.", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-18T00:00:00", "type": "zdi", "title": "Microsoft Windows Untrusted Script Execution Remote Code Execution Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30194"], "modified": "2022-08-18T00:00:00", "id": "ZDI-22-1073", "href": "https://www.zerodayinitiative.com/advisories/ZDI-22-1073/", "cvss": {"score": 4.6, "vector": "AV:N/AC:H/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T17:41:56", "description": "This vulnerability allows network-adjacent attackers to escalate privileges on affected installations of Microsoft Windows Active Directory Certificate Services. Authentication is required to exploit this vulnerability. The specific flaw exists within the issuance of certificates. By including crafted data in a certificate request, an attacker can obtain a certificate that allows the attacker to authenticate to a domain controller with a high level of privilege. An attacker can leverage this vulnerability to escalate privileges and disclose stored credentials, leading to further compromise.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-29T00:00:00", "type": "zdi", "title": "Microsoft Windows Active Directory Certificate Services Improper Authorization Privilege Escalation Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34691"], "modified": "2022-09-29T00:00:00", "id": "ZDI-22-1324", "href": "https://www.zerodayinitiative.com/advisories/ZDI-22-1324/", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T17:42:48", "description": "This vulnerability allows network-adjacent attackers to escalate privileges on affected installations of Microsoft Windows Active Directory Certificate Services. Authentication is required to exploit this vulnerability. The specific flaw exists within the issuance of certificates. By including crafted data in a certificate request, an attacker can obtain a certificate that allows the attacker to authenticate as a domain administrator. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code on domain-joined endpoints.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-06T00:00:00", "type": "zdi", "title": "Microsoft Windows Active Directory Certificate Services Improper Authorization Privilege Escalation Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34691"], "modified": "2022-09-06T00:00:00", "id": "ZDI-22-1185", "href": "https://www.zerodayinitiative.com/advisories/ZDI-22-1185/", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-05T16:03:26", "description": "This vulnerability allows network-adjacent attackers to escalate privileges on affected installations of Microsoft Windows Active Directory Certificate Services. Authentication is required to exploit this vulnerability. The specific flaw exists within the issuance of certificates. By including crafted data in a certificate request, an attacker can obtain a certificate that allows the attacker to authenticate to a domain controller with a high level of privilege. An attacker can leverage this vulnerability to escalate privileges and disclose stored credentials, leading to further compromise.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-05-24T00:00:00", "type": "zdi", "title": "Microsoft Windows Active Directory Certificate Services Improper Authorization Privilege Escalation Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-34691"], "modified": "2023-05-24T00:00:00", "id": "ZDI-23-722", "href": "https://www.zerodayinitiative.com/advisories/ZDI-23-722/", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "checkpoint_advisories": [{"lastseen": "2022-08-09T17:58:59", "description": "A denial-of-service vulnerability exists in Microsoft Windows. Successful exploitation of this vulnerability would allow a remote attacker to create a denial of service condition on the affected system.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "checkpoint_advisories", "title": "Microsoft HTTP.sys Denial of Service (CVE-2022-35748)", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2022-35748"], "modified": "2022-08-09T00:00:00", "id": "CPAI-2022-0480", "href": "", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2022-08-09T17:58:38", "description": "An elevation of privilege vulnerability exists in Microsoft Windows. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "checkpoint_advisories", "title": "Microsoft Windows Kerberos Elevation of Privilege (CVE-2022-35756)", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2022-35756"], "modified": "2022-08-09T00:00:00", "id": "CPAI-2022-0476", "href": "", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2022-08-09T17:59:26", "description": "An elevation of privilege vulnerability exists in Microsoft Windows. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "checkpoint_advisories", "title": "Microsoft Windows Hyper-V Elevation of Privilege (CVE-2022-35751)", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2022-35751"], "modified": "2022-08-09T00:00:00", "id": "CPAI-2022-0478", "href": "", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2022-08-09T17:59:46", "description": "An elevation of privilege vulnerability exists in Microsoft Windows. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "checkpoint_advisories", "title": "Microsoft Win32k Elevation of Privilege (CVE-2022-35750)", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2022-35750"], "modified": "2022-08-09T00:00:00", "id": "CPAI-2022-0470", "href": "", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2022-08-09T17:58:34", "description": "An elevation of privilege vulnerability exists in Microsoft Windows. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "checkpoint_advisories", "title": "Microsoft Windows Print Spooler Elevation of Privilege (CVE-2022-35793)", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2022-35793"], "modified": "2022-08-09T00:00:00", "id": "CPAI-2022-0474", "href": "", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2022-08-24T23:29:42", "description": "A remote code execution vulnerability exists in Microsoft Windows. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-08-09T00:00:00", "type": "checkpoint_advisories", "title": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution (CVE-2022-34713)", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2022-34713"], "modified": "2022-08-09T00:00:00", "id": "CPAI-2022-0471", "href": "", "cvss": {"score": 0.0, "vector": "NONE"}}], "mskb": [{"lastseen": "2022-08-24T11:36:37", "description": "None\n## **Summary**\n\nThis security update resolves vulnerabilities in Internet Explorer. To learn more about these vulnerabilities, see [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>).Additionally, see the following articles for more information about cumulative updates:\n\n * [Windows Server 2008 SP2 update history](<https://support.microsoft.com/help/4343218>)\n * [Windows 7 SP1 and Windows Server 2008 R2 SP1 update history](<https://support.microsoft.com/help/4009469>)\n * [Windows Server 2012 update history](<https://support.microsoft.com/help/4009471>)\n * [Windows 8.1 and Windows Server 2012 R2 update history](<https://support.microsoft.com/help/4009470>)\n\n**Important**\n\n * As of February 11, 2020, Internet Explorer 10 is no longer in support. To get Internet Explorer 11 for Windows Server 2012 or Windows 8 Embedded Standard, see [KB4492872](<https://support.microsoft.com/help/4492872>). Install one of the following applicable updates to stay updated with the latest security improvements:\n * Cumulative Update for Internet Explorer 11 for Windows Server 2012.\n * Cumulative Update for Internet Explorer 11 for Windows 8 Embedded Standard.\n * The August 2022 Monthly Rollup.\n * Some customers using Windows Server 2008 R2 SP1 who activated their ESU multiple activation key (MAK) add-on before installing the January 14, 2020 updates might need to re-activate their key. Re-activation of affected devices should only be required once. For information on activation, see this [blog](<https://aka.ms/Windows7ESU>) post.\n * WSUS scan cab files will continue to be available for Windows 7 SP1 and Windows Server 2008 R2 SP1. If you have a subset of devices running these operating systems without ESU, they might show as non-compliant in your update management and compliance toolsets.\n * Microsoft Internet Explorer has reached the end of servicing as of June 15, 2022 for certain operating systems. To continue receiving security and quality updates, we recommend that you update to [Microsoft Edge](<https://www.microsoft.com/en-us/edge>). For more information on the lifecycle policy for Internet Explorer, see [here](<https://docs.microsoft.com/en-us/lifecycle/faq/internet-explorer-microsoft-edge#what-is-the-lifecycle-policy-for-internet-explorer->).\n\nThis update applies to the following:\n\n * Internet Explorer 11 on Windows Server 2012 R2\n * Internet Explorer 11 on Windows 8.1\n * Internet Explorer 11 on Windows Server 2012\n * Internet Explorer 11 on Windows Server 2008 R2 SP1\n * Internet Explorer 11 on Windows 7 SP1\n\n**Note: **There is no update this release for Internet Explorer 9 on Windows Server 2008 SP2. For the latest update for Internet Explorer 9, see update [KB5011486](<https://support.microsoft.com/help/5011486>).\n\n**Important**\n\n * The improvements that are included in this update are also included in the August 2022 Security Monthly Quality Rollup. Installing either this update or the Security Monthly Quality Rollup installs the same improvements.\n * This update is not applicable for installation on a device on which the Security Monthly Quality Rollup from August 2022 (or a later month) is already installed. This is because that update contains all the same improvements that are included in this update.\n * If you use update management processes other than Windows Update and you automatically approve all security update classifications for deployment, this update, the August 2022 Security Only Quality Update, and the August 2022 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed.\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/library/hh825699>).\n\n## **Known issues in this security update**\n\nWe are currently not aware of any issues in this update.\n\n## **How to get and install this update**\n\n**Before installing this update**To install Windows 7 SP1, Windows Server 2008 R2 SP1, or Windows Server 2008 SP2 updates released on or after July 2019, you must have the following required updates installed. If you use Windows Update, these required updates will be offered automatically as needed.\n\n * Install the SHA-2 code signing support updates: \n \nFor Windows 7 SP1, Windows Server 2008 R2, and Windows Server 2008 SP2, you must have the SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) that is dated September 23, 2019 or a later SHA-2 update installed and then restart your device before you apply this update. For more information about SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>). \n \nFor Windows 7 SP1 and Windows Server 2008 R2 SP1, you must have installed the servicing stack update (SSU) ([KB4490628](<https://support.microsoft.com/help/4490628>)) that is dated March 12, 2019. After update [KB4490628](<https://support.microsoft.com/help/4490628>) is installed, we recommend that you install the July 12, 2022 SSU ([KB5016057](<https://support.microsoft.com/help/5016057>)) or a later SSU update. For more information about the latest SSU updates, see [ADV990001 | Latest Servicing Stack Updates](<https://portal.msrc.microsoft.com/security-guidance/advisory/ADV990001>). \n \nFor Windows Server 2008 SP2, you must have installed the servicing stack update (SSU) ([KB4493730](<https://support.microsoft.com/help/4493730>)) that is dated April 9, 2019. After update [KB4493730](<https://support.microsoft.com/help/4493730>) is installed, we recommend that you install the July 12, 2022 SSU ([KB5016129](<https://support.microsoft.com/help/5016129>)) or a later SSU update. For more information about the latest SSU updates, see [ADV990001 | Latest Servicing Stack Updates](<https://portal.msrc.microsoft.com/security-guidance/advisory/ADV990001>).\n * Install the Extended Security Update (ESU): \n \nFor Windows 7 SP1 and Windows Server 2008 R2 SP1, you must have installed the \"Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4538483](<https://support.microsoft.com/en/help/4538483>)) or the \"Update for the Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4575903](<https://support.microsoft.com/help/4575903>)). The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). \n \nFor Windows 7 SP1, Windows Server 2008 R2 SP1, and Windows Server 2008 SP2, you must have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems and follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ends. Extended support ends as follows:\n * For Windows 7 SP1, Windows Server 2008 R2 SP1, and Windows Server 2008 SP2, extended support ended on January 14, 2020.\n * For Windows Embedded Standard 7, extended support ended on October 13, 2020.\nFor more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>). \n \nFor Windows Embedded Standard 7, Windows Management Instrumentation (WMI) must be enabled to get updates from Windows Update or Windows Server Update Services.\n\n**Important** You must restart your device after you install these required updates.\n\n**Install this update**To install this update, use one of the following release channels.**Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| No| See the other following options. \nWindows Update for Business| Yes| None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016618>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically synchronize with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2008 Service Pack 2, Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1, Windows Server 2012, Windows Embedded 8 Standard, Windows 8.1, Windows Server 2012 R2**Classification**: Security Updates \n \n## **File information**\n\nThe English (United States) version of this software update installs files that have the attributes that are listed in the following tables.**Note** The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.\n\n### **Windows 8.1, Windows RT 8.1 and Windows Server 2012 R2**\n\n## \n\n__\n\nInternet Explorer 11 on all supported x86-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nactxprxy.dll| 6.3.9600.20512| 11-Jul-2022| 20:51| 1,049,600 \nhlink.dll| 6.3.9600.20512| 11-Jul-2022| 21:11| 103,936 \npngfilt.dll| 11.0.9600.20512| 11-Jul-2022| 21:24| 58,368 \nurlmon.dll| 11.0.9600.20512| 11-Jul-2022| 20:45| 1,342,976 \niexplore.exe| 11.0.9600.20512| 11-Jul-2022| 22:23| 811,416 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:02| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 31,232 \nWininetPlugin.dll| 6.3.9600.20512| 11-Jul-2022| 21:15| 35,328 \nhtml.iec| 2019.0.0.20512| 11-Jul-2022| 21:22| 341,504 \ninetcpl.cpl| 11.0.9600.20512| 11-Jul-2022| 20:57| 2,058,752 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:03| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:37| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 243,200 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 73,728 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 78,848 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:02| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 74,752 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 62,464 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 75,264 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 72,192 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 73,216 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 41,472 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 37,888 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 70,656 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 71,680 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 69,632 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 59,904 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 69,120 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 29,696 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 30,720 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 30,720 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 60,416 \nDiagnosticsHub.ScriptedSandboxPlugin.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 230,912 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:02| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 35,328 \nwininet.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 4,387,840 \njsproxy.dll| 11.0.9600.20512| 11-Jul-2022| 21:18| 47,104 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:03| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 88,064 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 74,752 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 75,776 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 75,776 \nieui.dll| 11.0.9600.20512| 11-Jul-2022| 21:16| 476,160 \niedkcs32.dll| 18.0.9600.20512| 11-Jul-2022| 20:58| 333,312 \ninstall.ins| Not versioned| 11-Jul-2022| 19:17| 464 \nieapfltr.dat| 10.0.9301.0| 18-Jan-2022| 16:54| 616,104 \nieapfltr.dll| 11.0.9600.20512| 11-Jul-2022| 20:41| 710,656 \niepeers.dll| 11.0.9600.20512| 11-Jul-2022| 21:03| 128,512 \nlicmgr10.dll| 11.0.9600.20512| 11-Jul-2022| 21:11| 27,136 \ntdc.ocx| 11.0.9600.20512| 11-Jul-2022| 21:06| 73,728 \nDiagnosticsHub.DataWarehouse.dll| 11.0.9600.20512| 11-Jul-2022| 21:25| 489,472 \niedvtool.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 772,608 \nDiagnosticsHub_is.dll| 11.0.9600.20512| 11-Jul-2022| 21:26| 38,912 \ndxtmsft.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 415,744 \ndxtrans.dll| 11.0.9600.20512| 11-Jul-2022| 21:03| 280,064 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:02| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 3,584 \nF12.dll| 11.0.9600.20512| 11-Jul-2022| 21:01| 1,207,808 \nDiagnosticsTap.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 175,104 \nMicrosoft-Windows-IE-F12-Provider.ptxml| Not versioned| 11-Jul-2022| 19:27| 11,892 \nF12Resources.dll| 11.0.9600.20512| 11-Jul-2022| 21:28| 10,948,096 \nF12Tools.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 256,000 \nmsfeedsbs.mof| Not versioned| 18-Jan-2022| 16:55| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 52,736 \nmsfeedssync.exe| 11.0.9600.20512| 11-Jul-2022| 21:23| 11,776 \nmsfeeds.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 696,320 \nmsfeeds.mof| Not versioned| 18-Jan-2022| 16:55| 1,518 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,066,432 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:36| 2,121,216 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,075,136 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:38| 2,063,872 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,314,240 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,390,528 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 2,034,176 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:05| 2,033,152 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 2,255,872 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,061,312 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,326,016 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,019,840 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,071,040 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,082,816 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,170,368 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,153,984 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,291,712 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,283,520 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,052,096 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,301,952 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,093,056 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,075,648 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 2,299,392 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 2,094,592 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,316,800 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 2,305,536 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,286,080 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,060,288 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 2,315,776 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 2,324,992 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 2,098,176 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 1,890,304 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 1,890,304 \nieframe.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 13,885,440 \nieframe.ptxml| Not versioned| 18-Jan-2022| 16:55| 24,486 \nmshta.exe| 11.0.9600.20512| 11-Jul-2022| 21:25| 12,800 \nmshtmled.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 76,800 \nmshtml.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 20,296,192 \nmshtml.tlb| 11.0.9600.16384| 18-Jan-2022| 16:55| 2,724,864 \nMicrosoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 18-Jan-2022| 16:55| 3,228 \nIEAdvpack.dll| 11.0.9600.20512| 11-Jul-2022| 21:17| 112,128 \nieetwcollector.exe| 11.0.9600.20512| 11-Jul-2022| 21:16| 104,960 \nieetwproxystub.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 47,616 \nieetwcollectorres.dll| 11.0.9600.16384| 18-Jan-2022| 16:55| 4,096 \nielowutil.exe| 11.0.9600.20512| 11-Jul-2022| 21:17| 221,184 \nieproxy.dll| 11.0.9600.20512| 11-Jul-2022| 20:40| 310,784 \nIEShims.dll| 11.0.9600.20512| 11-Jul-2022| 20:43| 290,304 \niexpress.exe| 11.0.9600.20512| 11-Jul-2022| 21:24| 152,064 \nwextract.exe| 11.0.9600.20512| 11-Jul-2022| 21:25| 137,728 \nimgutil.dll| 11.0.9600.20512| 11-Jul-2022| 20:49| 40,448 \nExtExport.exe| 11.0.9600.20512| 11-Jul-2022| 21:20| 25,600 \nieinstal.exe| 11.0.9600.20512| 11-Jul-2022| 21:03| 475,648 \nWindows Pop-up Blocked.wav| Not versioned| 18-Jan-2022| 16:55| 85,548 \nWindows Information Bar.wav| Not versioned| 18-Jan-2022| 16:55| 23,308 \nWindows Feed Discovered.wav| Not versioned| 18-Jan-2022| 16:55| 19,884 \nWindows Navigation Start.wav| Not versioned| 18-Jan-2022| 16:55| 11,340 \nbing.ico| Not versioned| 18-Jan-2022| 16:55| 5,430 \nieUnatt.exe| 11.0.9600.20512| 11-Jul-2022| 21:15| 115,712 \nMicrosoft-Windows-IE-InternetExplorer-ppdlic.xrm-ms| Not versioned| 11-Jul-2022| 22:13| 2,956 \njsdbgui.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 459,776 \njsprofilerui.dll| 11.0.9600.20512| 11-Jul-2022| 21:05| 579,584 \nMemoryAnalyzer.dll| 11.0.9600.20512| 11-Jul-2022| 21:14| 1,399,296 \nMshtmlDac.dll| 11.0.9600.20512| 11-Jul-2022| 21:21| 64,000 \nnetworkinspection.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 1,075,200 \noccache.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 130,048 \ndesktop.ini| Not versioned| 18-Jan-2022| 16:55| 65 \nwebcheck.dll| 11.0.9600.20512| 11-Jul-2022| 20:58| 230,400 \ndesktop.ini| Not versioned| 18-Jan-2022| 16:55| 65 \npdm.dll| 12.0.41202.0| 29-Jun-2022| 19:04| 442,992 \nmsdbg2.dll| 12.0.41202.0| 29-Jun-2022| 19:04| 315,008 \npdmproxy100.dll| 12.0.41202.0| 29-Jun-2022| 19:04| 99,984 \nmsrating.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 168,960 \nicrav03.rat| Not versioned| 18-Jan-2022| 16:55| 8,798 \nticrf.rat| Not versioned| 18-Jan-2022| 16:55| 1,988 \niertutil.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 2,309,120 \ninseng.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 91,136 \nie4uinit.exe| 11.0.9600.20512| 11-Jul-2022| 20:57| 692,224 \niernonce.dll| 11.0.9600.20512| 11-Jul-2022| 21:17| 30,720 \niesetup.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 62,464 \nieuinit.inf| Not versioned| 11-Jul-2022| 20:25| 16,303 \niesysprep.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 90,624 \nTimeline.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 154,112 \nTimeline_is.dll| 11.0.9600.20512| 11-Jul-2022| 21:18| 124,928 \nTimeline.cpu.xml| Not versioned| 29-Jun-2022| 19:04| 3,197 \nVGX.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 818,176 \nurl.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 235,520 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:34| 526,294 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:32| 499,654 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:33| 552,337 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:31| 944,559 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:03| 457,561 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:36| 543,946 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:36| 526,557 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:32| 575,838 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:30| 570,737 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:36| 548,119 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:33| 639,271 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:32| 525,504 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:36| 488,488 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:35| 548,494 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:32| 559,343 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:32| 535,067 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:31| 541,455 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:28| 804,470 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:32| 503,909 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:27| 521,583 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:24| 420,082 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:37| 436,651 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:34| 436,651 \ninetres.admx| Not versioned| 29-Jun-2022| 19:09| 1,678,023 \ninetcomm.dll| 6.3.9600.20512| 11-Jul-2022| 21:01| 880,640 \nINETRES.dll| 6.3.9600.16384| 18-Jan-2022| 16:55| 84,480 \njscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:16| 653,824 \njscript9.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 4,119,040 \njscript9diag.dll| 11.0.9600.20512| 11-Jul-2022| 21:15| 620,032 \nvbscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:23| 498,176 \n \n## \n\n__\n\nInternet Explorer 11 on all supported x64-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nactxprxy.dll| 6.3.9600.20512| 12-Jul-2022| 14:59| 2,882,048 \nhlink.dll| 6.3.9600.20512| 12-Jul-2022| 15:32| 113,664 \npngfilt.dll| 11.0.9600.20512| 12-Jul-2022| 15:49| 65,024 \nurlmon.dll| 11.0.9600.20512| 12-Jul-2022| 15:00| 1,563,648 \niexplore.exe| 11.0.9600.20512| 12-Jul-2022| 16:44| 811,432 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:34| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:03| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 16:32| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:03| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:03| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:03| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:34| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:27| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 31,232 \nWininetPlugin.dll| 6.3.9600.20512| 12-Jul-2022| 15:37| 43,008 \nhtml.iec| 2019.0.0.20512| 12-Jul-2022| 15:47| 417,280 \ninetcpl.cpl| 11.0.9600.20512| 12-Jul-2022| 15:10| 2,132,992 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:06| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 16:32| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:06| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:06| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:06| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:42| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 243,200 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 73,728 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:38| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 78,848 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:09| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 16:33| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 74,752 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:10| 62,464 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:40| 75,264 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:06| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 72,192 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 73,216 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 41,472 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 37,888 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:42| 70,656 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 71,680 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 69,632 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:27| 59,904 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:27| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 69,120 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 29,696 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 30,720 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 30,720 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 12-Jul-2022| 15:25| 77,824 \nDiagnosticsHub.ScriptedSandboxPlugin.dll| 11.0.9600.20512| 12-Jul-2022| 15:26| 276,480 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:40| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:38| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:09| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 16:31| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:07| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:40| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:27| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:29| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:38| 35,328 \nwininet.dll| 11.0.9600.20512| 12-Jul-2022| 15:14| 4,858,880 \njsproxy.dll| 11.0.9600.20512| 12-Jul-2022| 15:41| 54,784 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:38| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:38| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 16:32| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:07| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:07| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:09| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:42| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 88,064 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:42| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:27| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 74,752 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 75,776 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 75,776 \nieui.dll| 11.0.9600.20512| 12-Jul-2022| 15:39| 615,936 \niedkcs32.dll| 18.0.9600.20512| 12-Jul-2022| 15:10| 381,952 \ninstall.ins| Not versioned| 12-Jul-2022| 13:18| 464 \nieapfltr.dat| 10.0.9301.0| 31-Dec-2021| 23:57| 616,104 \nieapfltr.dll| 11.0.9600.20512| 12-Jul-2022| 14:44| 800,768 \niepeers.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 145,920 \nlicmgr10.dll| 11.0.9600.20512| 12-Jul-2022| 15:31| 33,280 \ntdc.ocx| 11.0.9600.20512| 12-Jul-2022| 15:24| 88,064 \nDiagnosticsHub.DataWarehouse.dll| 11.0.9600.20512| 12-Jul-2022| 15:50| 666,624 \niedvtool.dll| 11.0.9600.20512| 12-Jul-2022| 16:13| 950,784 \nDiagnosticsHub_is.dll| 11.0.9600.20512| 12-Jul-2022| 15:51| 50,176 \ndxtmsft.dll| 11.0.9600.20512| 12-Jul-2022| 15:30| 491,008 \ndxtrans.dll| 11.0.9600.20512| 12-Jul-2022| 15:20| 316,416 \nEscMigPlugin.dll| 11.0.9600.20512| 12-Jul-2022| 15:36| 124,416 \nescUnattend.exe| 11.0.9600.20512| 12-Jul-2022| 15:49| 87,040 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:38| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:09| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 16:31| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:07| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:07| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 3,584 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 3,584 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:42| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:26| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:29| 3,584 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 3,584 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 3,584 \nF12.dll| 11.0.9600.20512| 12-Jul-2022| 15:18| 1,422,848 \nDiagnosticsTap.dll| 11.0.9600.20512| 12-Jul-2022| 15:29| 245,248 \nMicrosoft-Windows-IE-F12-Provider.ptxml| Not versioned| 12-Jul-2022| 13:27| 11,892 \nF12Resources.dll| 11.0.9600.20512| 12-Jul-2022| 15:54| 10,949,120 \nF12Tools.dll| 11.0.9600.20512| 12-Jul-2022| 15:28| 372,224 \nmsfeedsbs.mof| Not versioned| 1-Jan-2022| 0:03| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 60,416 \nmsfeedssync.exe| 11.0.9600.20512| 12-Jul-2022| 15:48| 13,312 \nmsfeeds.dll| 11.0.9600.20512| 12-Jul-2022| 15:10| 809,472 \nmsfeeds.mof| Not versioned| 1-Jan-2022| 0:02| 1,518 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:41| 2,066,432 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 2,121,216 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:40| 2,075,136 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:41| 2,063,872 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 2,314,240 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 2,390,528 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 2,034,176 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 16:32| 2,033,152 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 2,255,872 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:11| 2,061,312 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 2,326,016 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:09| 2,019,840 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 2,071,040 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:09| 2,082,816 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 2,170,368 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 2,153,984 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 2,291,712 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 2,283,520 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:45| 2,052,096 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 2,301,952 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 2,093,056 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 2,075,648 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 2,299,392 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 2,094,592 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 2,316,800 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 2,305,536 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 2,286,080 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 2,060,288 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 2,315,776 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:29| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:29| 2,324,992 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 2,098,176 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:40| 1,890,304 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:41| 1,890,304 \nieframe.dll| 11.0.9600.20512| 12-Jul-2022| 15:18| 15,509,504 \nieframe.ptxml| Not versioned| 31-Dec-2021| 23:57| 24,486 \nmshta.exe| 11.0.9600.20512| 12-Jul-2022| 15:50| 13,824 \nmshtmled.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 92,672 \nmshtml.dll| 11.0.9600.20512| 12-Jul-2022| 16:13| 25,761,280 \nmshtml.tlb| 11.0.9600.16384| 31-Dec-2021| 23:57| 2,724,864 \nMicrosoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 31-Dec-2021| 23:57| 3,228 \nIEAdvpack.dll| 11.0.9600.20512| 12-Jul-2022| 15:40| 132,096 \nieetwcollector.exe| 11.0.9600.20512| 12-Jul-2022| 15:38| 116,224 \nieetwproxystub.dll| 11.0.9600.20512| 12-Jul-2022| 15:47| 48,640 \nieetwcollectorres.dll| 11.0.9600.16384| 31-Dec-2021| 23:57| 4,096 \nielowutil.exe| 11.0.9600.20512| 12-Jul-2022| 15:40| 222,720 \nieproxy.dll| 11.0.9600.20512| 12-Jul-2022| 14:43| 870,400 \nIEShims.dll| 11.0.9600.20512| 12-Jul-2022| 14:48| 387,072 \niexpress.exe| 11.0.9600.20512| 12-Jul-2022| 15:50| 167,424 \nwextract.exe| 11.0.9600.20512| 12-Jul-2022| 15:50| 143,872 \nimgutil.dll| 11.0.9600.20512| 12-Jul-2022| 14:56| 51,712 \nieinstal.exe| 11.0.9600.20512| 12-Jul-2022| 15:20| 492,032 \nWindows Pop-up Blocked.wav| Not versioned| 31-Dec-2021| 23:57| 85,548 \nWindows Information Bar.wav| Not versioned| 31-Dec-2021| 23:57| 23,308 \nWindows Feed Discovered.wav| Not versioned| 31-Dec-2021| 23:57| 19,884 \nWindows Navigation Start.wav| Not versioned| 31-Dec-2021| 23:57| 11,340 \nbing.ico| Not versioned| 31-Dec-2021| 23:57| 5,430 \nieUnatt.exe| 11.0.9600.20512| 12-Jul-2022| 15:38| 144,384 \nMicrosoft-Windows-IE-InternetExplorer-ppdlic.xrm-ms| Not versioned| 12-Jul-2022| 16:40| 2,956 \njsdbgui.dll| 11.0.9600.20512| 12-Jul-2022| 15:22| 591,872 \njsprofilerui.dll| 11.0.9600.20512| 12-Jul-2022| 15:23| 628,736 \nMemoryAnalyzer.dll| 11.0.9600.20512| 12-Jul-2022| 15:36| 1,862,656 \nMshtmlDac.dll| 11.0.9600.20512| 12-Jul-2022| 15:46| 88,064 \nnetworkinspection.dll| 11.0.9600.20512| 12-Jul-2022| 15:18| 1,217,024 \noccache.dll| 11.0.9600.20512| 12-Jul-2022| 15:19| 152,064 \ndesktop.ini| Not versioned| 31-Dec-2021| 23:57| 65 \nwebcheck.dll| 11.0.9600.20512| 12-Jul-2022| 15:12| 262,144 \ndesktop.ini| Not versioned| 1-Jan-2022| 0:00| 65 \npdm.dll| 12.0.41202.0| 12-Jul-2022| 12:34| 579,192 \nmsdbg2.dll| 12.0.41202.0| 12-Jul-2022| 12:34| 403,592 \npdmproxy100.dll| 12.0.41202.0| 12-Jul-2022| 12:34| 107,152 \nmsrating.dll| 11.0.9600.20512| 12-Jul-2022| 15:22| 199,680 \nicrav03.rat| Not versioned| 1-Jan-2022| 0:02| 8,798 \nticrf.rat| Not versioned| 1-Jan-2022| 0:02| 1,988 \niertutil.dll| 11.0.9600.20512| 12-Jul-2022| 15:52| 2,917,888 \ninseng.dll| 11.0.9600.20512| 12-Jul-2022| 15:24| 107,520 \nie4uinit.exe| 11.0.9600.20512| 12-Jul-2022| 15:10| 728,064 \niernonce.dll| 11.0.9600.20512| 12-Jul-2022| 15:41| 34,304 \niesetup.dll| 11.0.9600.20512| 12-Jul-2022| 15:47| 66,560 \nieuinit.inf| Not versioned| 12-Jul-2022| 14:27| 16,303 \niesysprep.dll| 11.0.9600.20512| 12-Jul-2022| 15:25| 111,616 \nTimeline.dll| 11.0.9600.20512| 12-Jul-2022| 15:24| 219,648 \nTimeline_is.dll| 11.0.9600.20512| 12-Jul-2022| 15:41| 172,032 \nTimeline.cpu.xml| Not versioned| 7-Jul-2022| 17:20| 3,197 \nVGX.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 1,018,880 \nurl.dll| 11.0.9600.20512| 12-Jul-2022| 15:47| 237,568 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:41| 526,294 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:37| 499,654 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:37| 552,337 \nInetRes.adml| Not versioned| 12-Jul-2022| 23:07| 944,559 \nInetRes.adml| Not versioned| 12-Jul-2022| 16:32| 457,561 \nInetRes.adml| Not versioned| 12-Jul-2022| 23:08| 543,946 \nInetRes.adml| Not versioned| 12-Jul-2022| 23:06| 526,557 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:37| 575,838 \nInetRes.adml| Not versioned| 12-Jul-2022| 23:10| 570,737 \nInetRes.adml| Not versioned| 12-Jul-2022| 22:43| 548,119 \nInetRes.adml| Not versioned| 12-Jul-2022| 22:43| 639,271 \nInetRes.adml| Not versioned| 12-Jul-2022| 22:43| 525,504 \nInetRes.adml| Not versioned| 12-Jul-2022| 22:43| 488,488 \nInetRes.adml| Not versioned| 12-Jul-2022| 22:44| 548,494 \nInetRes.adml| Not versioned| 12-Jul-2022| 22:44| 559,343 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:35| 535,067 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:36| 541,455 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:32| 804,470 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:36| 503,909 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:30| 521,583 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:29| 420,082 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:37| 436,651 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:38| 436,651 \ninetres.admx| Not versioned| 12-Jul-2022| 12:37| 1,678,023 \ninetcomm.dll| 6.3.9600.20512| 12-Jul-2022| 15:16| 1,033,216 \nINETRES.dll| 6.3.9600.16384| 1-Jan-2022| 0:03| 84,480 \njscript.dll| 5.8.9600.20512| 12-Jul-2022| 15:38| 785,408 \njscript9.dll| 11.0.9600.20512| 12-Jul-2022| 15:53| 5,508,096 \njscript9diag.dll| 11.0.9600.20512| 12-Jul-2022| 15:37| 814,592 \nvbscript.dll| 5.8.9600.20512| 12-Jul-2022| 15:47| 581,120 \niexplore.exe| 11.0.9600.20512| 11-Jul-2022| 22:23| 811,416 \nhtml.iec| 2019.0.0.20512| 11-Jul-2022| 21:22| 341,504 \nieui.dll| 11.0.9600.20512| 11-Jul-2022| 21:16| 476,160 \niepeers.dll| 11.0.9600.20512| 11-Jul-2022| 21:03| 128,512 \ntdc.ocx| 11.0.9600.20512| 11-Jul-2022| 21:06| 73,728 \ndxtmsft.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 415,744 \ndxtrans.dll| 11.0.9600.20512| 11-Jul-2022| 21:03| 280,064 \nmsfeeds.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 696,320 \nmsfeeds.mof| Not versioned| 31-Dec-2021| 23:57| 1,518 \nieframe.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 13,885,440 \nie9props.propdesc| Not versioned| 31-Dec-2021| 23:57| 2,843 \nwow64_ieframe.ptxml| Not versioned| 31-Dec-2021| 23:57| 24,486 \nmshta.exe| 11.0.9600.20512| 11-Jul-2022| 21:25| 12,800 \nmshtmled.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 76,800 \nmshtml.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 20,296,192 \nmshtml.tlb| 11.0.9600.16384| 31-Dec-2021| 23:58| 2,724,864 \nwow64_Microsoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 31-Dec-2021| 23:58| 3,228 \nieetwproxystub.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 47,616 \nieUnatt.exe| 11.0.9600.20512| 11-Jul-2022| 21:15| 115,712 \noccache.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 130,048 \nwebcheck.dll| 11.0.9600.20512| 11-Jul-2022| 20:58| 230,400 \niernonce.dll| 11.0.9600.20512| 11-Jul-2022| 21:17| 30,720 \niesetup.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 62,464 \nieuinit.inf| Not versioned| 11-Jul-2022| 20:25| 16,303 \niesysprep.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 90,624 \njscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:16| 653,824 \njscript9.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 4,119,040 \njscript9diag.dll| 11.0.9600.20512| 11-Jul-2022| 21:15| 620,032 \nvbscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:23| 498,176 \nactxprxy.dll| 6.3.9600.20512| 11-Jul-2022| 20:51| 1,049,600 \nhlink.dll| 6.3.9600.20512| 11-Jul-2022| 21:11| 103,936 \npngfilt.dll| 11.0.9600.20512| 11-Jul-2022| 21:24| 58,368 \nurlmon.dll| 11.0.9600.20512| 11-Jul-2022| 20:45| 1,342,976 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:02| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 31,232 \nWininetPlugin.dll| 6.3.9600.20512| 11-Jul-2022| 21:15| 35,328 \ninetcpl.cpl| 11.0.9600.20512| 11-Jul-2022| 20:57| 2,058,752 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:03| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:37| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 243,200 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 60,416 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:02| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 35,328 \nwininet.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 4,387,840 \njsproxy.dll| 11.0.9600.20512| 11-Jul-2022| 21:18| 47,104 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:03| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 88,064 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 74,752 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 75,776 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 75,776 \niedkcs32.dll| 18.0.9600.20512| 11-Jul-2022| 20:58| 333,312 \ninstall.ins| Not versioned| 11-Jul-2022| 19:17| 464 \nieapfltr.dat| 10.0.9301.0| 31-Dec-2021| 23:58| 616,104 \nieapfltr.dll| 11.0.9600.20512| 11-Jul-2022| 20:41| 710,656 \nlicmgr10.dll| 11.0.9600.20512| 11-Jul-2022| 21:11| 27,136 \niedvtool.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 772,608 \nDiagnosticsTap.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 175,104 \nF12Tools.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 256,000 \nmsfeedsbs.mof| Not versioned| 1-Jan-2022| 0:02| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 52,736 \nmsfeedssync.exe| 11.0.9600.20512| 11-Jul-2022| 21:23| 11,776 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,066,432 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:36| 2,121,216 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,075,136 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:38| 2,063,872 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,314,240 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,390,528 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 2,034,176 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:05| 2,033,152 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 2,255,872 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,061,312 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,326,016 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,019,840 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,071,040 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,082,816 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,170,368 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,153,984 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,291,712 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,283,520 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,052,096 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,301,952 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,093,056 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,075,648 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 2,299,392 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 2,094,592 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,316,800 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 2,305,536 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,286,080 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,060,288 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 2,315,776 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 2,324,992 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 2,098,176 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 1,890,304 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 1,890,304 \nIEAdvpack.dll| 11.0.9600.20512| 11-Jul-2022| 21:17| 112,128 \nielowutil.exe| 11.0.9600.20512| 11-Jul-2022| 21:17| 221,184 \nieproxy.dll| 11.0.9600.20512| 11-Jul-2022| 20:40| 310,784 \nIEShims.dll| 11.0.9600.20512| 11-Jul-2022| 20:43| 290,304 \niexpress.exe| 11.0.9600.20512| 11-Jul-2022| 21:24| 152,064 \nwextract.exe| 11.0.9600.20512| 11-Jul-2022| 21:25| 137,728 \nimgutil.dll| 11.0.9600.20512| 11-Jul-2022| 20:49| 40,448 \nExtExport.exe| 11.0.9600.20512| 11-Jul-2022| 21:20| 25,600 \nieinstal.exe| 11.0.9600.20512| 11-Jul-2022| 21:03| 475,648 \njsdbgui.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 459,776 \njsprofilerui.dll| 11.0.9600.20512| 11-Jul-2022| 21:05| 579,584 \nMshtmlDac.dll| 11.0.9600.20512| 11-Jul-2022| 21:21| 64,000 \nnetworkinspection.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 1,075,200 \npdm.dll| 12.0.41202.0| 29-Jun-2022| 19:04| 442,992 \nmsdbg2.dll| 12.0.41202.0| 29-Jun-2022| 19:04| 315,008 \npdmproxy100.dll| 12.0.41202.0| 29-Jun-2022| 19:04| 99,984 \nmsrating.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 168,960 \nicrav03.rat| Not versioned| 31-Dec-2021| 23:57| 8,798 \nticrf.rat| Not versioned| 31-Dec-2021| 23:57| 1,988 \niertutil.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 2,309,120 \ninseng.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 91,136 \nVGX.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 818,176 \nurl.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 235,520 \ninetcomm.dll| 6.3.9600.20512| 11-Jul-2022| 21:01| 880,640 \nINETRES.dll| 6.3.9600.16384| 1-Jan-2022| 0:02| 84,480 \n \n## \n\n__\n\nInternet Explorer 11 on all supported Arm-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nactxprxy.dll| 6.3.9600.20512| 11-Jul-2022| 20:36| 1,064,960 \nhlink.dll| 6.3.9600.20512| 11-Jul-2022| 20:57| 73,216 \npngfilt.dll| 11.0.9600.20512| 11-Jul-2022| 21:10| 47,616 \nurlmon.dll| 11.0.9600.20512| 11-Jul-2022| 20:28| 1,035,264 \niexplore.exe| 11.0.9600.20512| 11-Jul-2022| 21:48| 808,864 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 21:38| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 31,232 \nWininetPlugin.dll| 6.3.9600.16384| 28-Dec-2021| 18:02| 33,792 \nhtml.iec| 2019.0.0.20512| 11-Jul-2022| 21:08| 320,000 \ninetcpl.cpl| 11.0.9600.20512| 11-Jul-2022| 20:44| 2,007,040 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 21:39| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:18| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 243,200 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 73,728 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:18| 78,848 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 21:39| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 74,752 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 62,464 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 75,264 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 72,192 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 73,216 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 41,472 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 37,888 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 70,656 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 71,680 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 69,632 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 59,904 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 69,120 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 29,696 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 30,720 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 30,720 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 11-Jul-2022| 20:53| 63,488 \nDiagnosticsHub.ScriptedSandboxPlugin.dll| 11.0.9600.20512| 11-Jul-2022| 20:54| 215,552 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 21:39| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 35,328 \nwininet.dll| 11.0.9600.20512| 11-Jul-2022| 20:27| 4,147,712 \njsproxy.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 39,936 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 21:40| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 88,064 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 74,752 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 75,776 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 75,776 \nieui.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 427,520 \niedkcs32.dll| 18.0.9600.20512| 11-Jul-2022| 20:44| 292,864 \ninstall.ins| Not versioned| 11-Jul-2022| 19:18| 464 \nieapfltr.dat| 10.0.9301.0| 28-Dec-2021| 18:02| 616,104 \nieapfltr.dll| 11.0.9600.20512| 11-Jul-2022| 20:30| 548,864 \niepeers.dll| 11.0.9600.20512| 11-Jul-2022| 20:49| 107,008 \nlicmgr10.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 23,552 \ntdc.ocx| 11.0.9600.20512| 11-Jul-2022| 20:52| 62,464 \nDiagnosticsHub.DataWarehouse.dll| 11.0.9600.20512| 11-Jul-2022| 21:10| 495,616 \niedvtool.dll| 11.0.9600.20512| 11-Jul-2022| 21:01| 726,016 \nDiagnosticsHub_is.dll| 11.0.9600.20512| 11-Jul-2022| 21:11| 39,936 \ndxtmsft.dll| 11.0.9600.20512| 11-Jul-2022| 20:56| 364,032 \ndxtrans.dll| 11.0.9600.20512| 11-Jul-2022| 20:49| 221,696 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 21:39| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 3,584 \nF12.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 1,186,304 \nDiagnosticsTap.dll| 11.0.9600.20512| 11-Jul-2022| 20:56| 175,616 \nMicrosoft-Windows-IE-F12-Provider.ptxml| Not versioned| 11-Jul-2022| 19:24| 11,892 \nF12Resources.dll| 11.0.9600.20512| 11-Jul-2022| 21:13| 10,948,608 \nF12Tools.dll| 11.0.9600.20512| 11-Jul-2022| 20:55| 263,680 \nmsfeedsbs.mof| Not versioned| 28-Dec-2021| 18:03| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 11-Jul-2022| 20:50| 43,520 \nmsfeedssync.exe| 11.0.9600.16384| 28-Dec-2021| 18:03| 11,776 \nmsfeeds.dll| 11.0.9600.20512| 11-Jul-2022| 20:44| 587,776 \nmsfeeds.mof| Not versioned| 28-Dec-2021| 18:02| 1,518 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,066,432 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,121,216 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,075,136 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,063,872 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,314,240 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,390,528 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,034,176 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 21:39| 2,033,152 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,255,872 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,061,312 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:18| 2,326,016 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:18| 2,019,840 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,071,040 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,082,816 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,170,368 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,153,984 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,291,712 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,283,520 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,052,096 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,301,952 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,093,056 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 2,075,648 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 2,299,392 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 2,094,592 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 2,316,800 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 2,305,536 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 2,286,080 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 2,060,288 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 2,315,776 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 2,324,992 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 2,098,176 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 1,890,304 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:18| 1,890,304 \nieframe.dll| 11.0.9600.20512| 11-Jul-2022| 20:32| 12,318,720 \nieframe.ptxml| Not versioned| 28-Dec-2021| 18:03| 24,486 \nmshtmled.dll| 11.0.9600.20512| 11-Jul-2022| 20:50| 73,216 \nmshtml.dll| 11.0.9600.20512| 11-Jul-2022| 20:44| 16,229,888 \nmshtml.tlb| 11.0.9600.16384| 28-Dec-2021| 18:01| 2,724,864 \nMicrosoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 28-Dec-2021| 18:01| 3,228 \nIEAdvpack.dll| 11.0.9600.16384| 28-Dec-2021| 18:01| 98,816 \nieetwcollector.exe| 11.0.9600.20512| 11-Jul-2022| 21:02| 98,816 \nieetwproxystub.dll| 11.0.9600.16384| 28-Dec-2021| 18:03| 43,008 \nieetwcollectorres.dll| 11.0.9600.16384| 28-Dec-2021| 18:03| 4,096 \nielowutil.exe| 11.0.9600.20512| 11-Jul-2022| 21:03| 222,208 \nieproxy.dll| 11.0.9600.20512| 11-Jul-2022| 20:29| 308,224 \nIEShims.dll| 11.0.9600.20512| 11-Jul-2022| 20:32| 268,800 \nimgutil.dll| 11.0.9600.20512| 11-Jul-2022| 20:37| 34,816 \nWindows Pop-up Blocked.wav| Not versioned| 28-Dec-2021| 18:01| 85,548 \nWindows Information Bar.wav| Not versioned| 28-Dec-2021| 18:01| 23,308 \nWindows Feed Discovered.wav| Not versioned| 28-Dec-2021| 18:01| 19,884 \nWindows Navigation Start.wav| Not versioned| 28-Dec-2021| 18:01| 11,340 \nbing.ico| Not versioned| 28-Dec-2021| 18:01| 5,430 \nieUnatt.exe| 11.0.9600.16384| 28-Dec-2021| 18:01| 112,128 \nMicrosoft-Windows-IE-InternetExplorer-ppdlic.xrm-ms| Not versioned| 11-Jul-2022| 21:45| 2,956 \njsdbgui.dll| 11.0.9600.20512| 11-Jul-2022| 20:51| 457,216 \njsprofilerui.dll| 11.0.9600.20512| 11-Jul-2022| 20:51| 574,976 \nMemoryAnalyzer.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 1,935,360 \nMshtmlDac.dll| 11.0.9600.20512| 11-Jul-2022| 21:07| 60,928 \nnetworkinspection.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 1,105,408 \noccache.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 121,856 \ndesktop.ini| Not versioned| 28-Dec-2021| 18:03| 65 \nwebcheck.dll| 11.0.9600.20512| 11-Jul-2022| 20:45| 201,216 \ndesktop.ini| Not versioned| 28-Dec-2021| 18:03| 65 \npdm.dll| 12.0.20712.1| 28-Dec-2021| 18:02| 420,752 \nmsdbg2.dll| 12.0.20712.1| 28-Dec-2021| 18:02| 295,320 \npdmproxy100.dll| 12.0.20712.1| 28-Dec-2021| 18:02| 76,712 \nmsrating.dll| 11.0.9600.20512| 11-Jul-2022| 20:51| 157,184 \nicrav03.rat| Not versioned| 28-Dec-2021| 18:01| 8,798 \nticrf.rat| Not versioned| 28-Dec-2021| 18:01| 1,988 \niertutil.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 2,186,752 \ninseng.dll| 11.0.9600.16384| 28-Dec-2021| 18:01| 77,312 \nie4uinit.exe| 11.0.9600.20512| 11-Jul-2022| 20:44| 678,400 \niernonce.dll| 11.0.9600.16384| 28-Dec-2021| 18:02| 28,160 \niesetup.dll| 11.0.9600.16384| 28-Dec-2021| 18:02| 59,904 \nieuinit.inf| Not versioned| 11-Jul-2022| 20:17| 16,303 \niesysprep.dll| 11.0.9600.20512| 11-Jul-2022| 20:52| 87,552 \nTimeline.dll| 11.0.9600.20512| 11-Jul-2022| 20:52| 155,648 \nTimeline_is.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 130,048 \nTimeline.cpu.xml| Not versioned| 2-Jun-2022| 17:43| 3,197 \nVGX.dll| 11.0.9600.20512| 11-Jul-2022| 20:50| 734,720 \nurl.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 236,032 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 526,294 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:16| 499,654 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 552,337 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:18| 944,559 \nInetRes.adml| Not versioned| 11-Jul-2022| 21:40| 457,561 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 543,946 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 526,557 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 575,838 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 570,737 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 548,119 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:16| 639,271 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 525,504 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 488,488 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 548,494 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 559,343 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:15| 535,067 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:15| 541,455 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:16| 804,470 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:16| 503,909 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:13| 521,583 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:14| 420,082 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:18| 436,651 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 436,651 \ninetres.admx| Not versioned| 7-Jun-2022| 12:03| 1,678,023 \ninetcomm.dll| 6.3.9600.20512| 11-Jul-2022| 20:46| 675,328 \nINETRES.dll| 6.3.9600.16384| 28-Dec-2021| 18:02| 84,480 \njscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:02| 516,096 \njscript9.dll| 11.0.9600.20512| 11-Jul-2022| 20:38| 3,571,712 \njscript9diag.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 557,568 \nvbscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:07| 403,968 \n \n### **Windows Server 2012**\n\n## \n\n__\n\nInternet Explorer 11 on all supported x86-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nFileinfo.xml| Not versioned| 14-Jul-22| 3:34| 592,235 \nIe11-windows6.2-kb5016618-x86-express.cab| Not versioned| 14-Jul-22| 3:18| 741,463 \nIe11-windows6.2-kb5016618-x86.msu| Not versioned| 14-Jul-22| 2:57| 27,691,365 \nIe11-windows6.2-kb5016618-x86.psf| Not versioned| 14-Jul-22| 3:08| 184,707,453 \nPackageinfo.xml| Not versioned| 14-Jul-22| 3:35| 1,133 \nPackagestructure.xml| Not versioned| 14-Jul-22| 3:34| 149,919 \nPrebvtpackageinfo.xml| Not versioned| 14-Jul-22| 3:34| 573 \nIe11-windows6.2-kb5016618-x86.cab| Not versioned| 14-Jul-22| 9:47| 27,558,707 \nIe11-windows6.2-kb5016618-x86.xml| Not versioned| 14-Jul-22| 9:51| 450 \nWsusscan.cab| Not versioned| 14-Jul-22| 9:54| 175,478 \nHlink.dll| 6.3.9600.20512| 12-Jul-22| 4:11| 103,936 \nUrlmon.dll| 11.0.9600.20512| 12-Jul-22| 3:45| 1,342,976 \nIexplore.exe| 11.0.9600.20512| 13-Jul-22| 22:48| 811,448 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 46,592 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 56,320 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 57,856 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 47,616 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 49,152 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 55,296 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 45,056 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 53,248 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 39,424 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 35,840 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 50,176 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 53,760 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 53,248 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 50,176 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 30,720 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 30,720 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 30,720 \nInetcpl.cpl| 11.0.9600.20512| 12-Jul-22| 3:57| 2,058,752 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 307,200 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 293,888 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 290,304 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 289,280 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 299,008 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 303,104 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 282,112 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 296,960 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 283,648 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 291,840 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 299,520 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 275,968 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 290,816 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 293,376 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 296,960 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 258,048 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 256,512 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 289,280 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 288,256 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 285,184 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 295,424 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 297,472 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 292,864 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 295,424 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 294,400 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 294,400 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 292,864 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 290,816 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 288,768 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 286,208 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 281,600 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 286,720 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 292,352 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 242,176 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 243,200 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 46,080 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 51,712 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 54,272 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 50,688 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 45,056 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 39,936 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 39,424 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 51,200 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 50,688 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 35,328 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 35,328 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:19| 35,328 \nJsproxy.dll| 11.0.9600.20512| 12-Jul-22| 4:18| 47,104 \nWininet.dll| 11.0.9600.20512| 12-Jul-22| 3:48| 4,387,840 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 114,176 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 130,560 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 124,928 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 122,880 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 130,048 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 138,240 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 114,688 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 131,584 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 117,760 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 122,368 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 134,144 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 107,008 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 123,392 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 127,488 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 128,512 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 88,576 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 82,944 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 125,440 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 123,392 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 120,320 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 130,560 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 125,952 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 128,000 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 124,416 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 121,856 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 115,712 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 125,440 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 72,704 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 73,728 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 73,728 \nMsfeedsbs.dll| 11.0.9600.20512| 12-Jul-22| 4:04| 52,736 \nMsfeedsbs.mof| Not versioned| 12-Jul-22| 2:34| 1,574 \nMsfeedssync.exe| 11.0.9600.20512| 12-Jul-22| 4:23| 11,776 \nMicrosoft-windows-ie-htmlrendering.ptxml| Not versioned| 12-Jul-22| 2:27| 3,228 \nMshtml.dll| 11.0.9600.20512| 12-Jul-22| 4:40| 20,296,192 \nMshtml.tlb| 11.0.9600.20512| 12-Jul-22| 4:31| 2,724,864 \nIeproxy.dll| 11.0.9600.20512| 12-Jul-22| 3:40| 310,784 \nIeshims.dll| 11.0.9600.20512| 12-Jul-22| 3:43| 290,304 \nIertutil.dll| 11.0.9600.20512| 12-Jul-22| 4:22| 2,309,120 \nSqmapi.dll| 6.2.9200.16384| 13-Jul-22| 22:48| 229,304 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 2,066,432 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 2,121,216 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 2,075,648 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 2,063,872 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 2,314,240 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 2,390,528 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 2,033,152 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 2,307,584 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 2,255,872 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 2,061,312 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 2,326,016 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 2,019,840 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 2,071,040 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 2,082,816 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 2,307,584 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 2,170,368 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 2,153,984 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 2,291,712 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 2,283,520 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 2,052,096 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 2,301,952 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 2,093,056 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 2,075,648 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 2,299,392 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 2,094,592 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 2,316,800 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 2,305,536 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 2,278,912 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 2,285,568 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 2,060,288 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 2,315,776 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 2,279,424 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 2,324,992 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 2,098,176 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 1,890,304 \nIeframe.dll| 11.0.9600.20512| 12-Jul-22| 4:04| 13,885,440 \nIeframe.ptxml| Not versioned| 12-Jul-22| 2:27| 24,486 \nInetres.adml| Not versioned| 13-Jul-22| 22:50| 463,373 \nInetres.adml| Not versioned| 13-Jul-22| 22:51| 751,353 \nInetres.adml| Not versioned| 13-Jul-22| 22:52| 526,345 \nInetres.adml| Not versioned| 13-Jul-22| 22:53| 499,703 \nInetres.adml| Not versioned| 13-Jul-22| 22:54| 552,387 \nInetres.adml| Not versioned| 13-Jul-22| 22:54| 944,611 \nInetres.adml| Not versioned| 14-Jul-22| 1:44| 457,561 \nInetres.adml| Not versioned| 13-Jul-22| 22:55| 543,996 \nInetres.adml| Not versioned| 13-Jul-22| 22:56| 751,459 \nInetres.adml| Not versioned| 13-Jul-22| 22:57| 526,605 \nInetres.adml| Not versioned| 13-Jul-22| 22:58| 575,888 \nInetres.adml| Not versioned| 13-Jul-22| 22:59| 463,373 \nInetres.adml| Not versioned| 13-Jul-22| 22:59| 751,277 \nInetres.adml| Not versioned| 13-Jul-22| 23:00| 570,787 \nInetres.adml| Not versioned| 13-Jul-22| 23:01| 548,169 \nInetres.adml| Not versioned| 13-Jul-22| 23:02| 639,283 \nInetres.adml| Not versioned| 13-Jul-22| 23:03| 525,516 \nInetres.adml| Not versioned| 13-Jul-22| 23:04| 751,512 \nInetres.adml| Not versioned| 13-Jul-22| 23:04| 751,242 \nInetres.adml| Not versioned| 13-Jul-22| 23:05| 488,538 \nInetres.adml| Not versioned| 13-Jul-22| 23:06| 548,543 \nInetres.adml| Not versioned| 13-Jul-22| 23:07| 559,391 \nInetres.adml| Not versioned| 13-Jul-22| 23:08| 535,117 \nInetres.adml| Not versioned| 13-Jul-22| 23:09| 541,504 \nInetres.adml| Not versioned| 13-Jul-22| 23:09| 751,415 \nInetres.adml| Not versioned| 13-Jul-22| 23:10| 804,521 \nInetres.adml| Not versioned| 13-Jul-22| 23:11| 751,377 \nInetres.adml| Not versioned| 13-Jul-22| 23:12| 751,273 \nInetres.adml| Not versioned| 13-Jul-22| 23:13| 751,520 \nInetres.adml| Not versioned| 13-Jul-22| 23:13| 503,961 \nInetres.adml| Not versioned| 13-Jul-22| 23:14| 751,418 \nInetres.adml| Not versioned| 13-Jul-22| 23:15| 521,631 \nInetres.adml| Not versioned| 13-Jul-22| 23:15| 751,199 \nInetres.adml| Not versioned| 13-Jul-22| 23:17| 420,094 \nInetres.adml| Not versioned| 13-Jul-22| 23:17| 436,663 \nInetres.adml| Not versioned| 13-Jul-22| 23:18| 436,663 \nInetres.admx| Not versioned| 30-Jun-22| 2:09| 1,678,023 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 29,184 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 35,328 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 37,888 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:43| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 27,648 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 33,792 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 23,040 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 22,016 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 31,232 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 35,840 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 34,816 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 32,256 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 30,720 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 16,384 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 16,896 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 16,896 \nJscript9.dll| 11.0.9600.20512| 12-Jul-22| 4:08| 4,119,040 \nJscript9diag.dll| 11.0.9600.20512| 12-Jul-22| 4:15| 620,032 \nJscript.dll| 5.8.9600.20512| 12-Jul-22| 4:16| 653,824 \nVbscript.dll| 5.8.9600.20512| 12-Jul-22| 4:23| 498,176 \nPackage.cab| Not versioned| 14-Jul-22| 9:51| 300,527 \n \n## \n\n__\n\nInternet Explorer 11 on all supported x64-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nFileinfo.xml| Not versioned| 14-Jul-22| 3:37| 921,819 \nIe11-windows6.2-kb5016618-x64-express.cab| Not versioned| 14-Jul-22| 3:20| 1,246,895 \nIe11-windows6.2-kb5016618-x64.msu| Not versioned| 14-Jul-22| 2:59| 48,302,513 \nIe11-windows6.2-kb5016618-x64.psf| Not versioned| 14-Jul-22| 3:11| 283,480,073 \nPackageinfo.xml| Not versioned| 14-Jul-22| 3:37| 1,228 \nPackagestructure.xml| Not versioned| 14-Jul-22| 3:37| 240,590 \nPrebvtpackageinfo.xml| Not versioned| 14-Jul-22| 3:37| 652 \nIe11-windows6.2-kb5016618-x64.cab| Not versioned| 14-Jul-22| 9:51| 48,200,481 \nIe11-windows6.2-kb5016618-x64.xml| Not versioned| 14-Jul-22| 9:51| 452 \nWsusscan.cab| Not versioned| 14-Jul-22| 9:56| 176,342 \nHlink.dll| 6.3.9600.20512| 12-Jul-22| 22:32| 113,664 \nUrlmon.dll| 11.0.9600.20512| 12-Jul-22| 22:00| 1,563,648 \nIexplore.exe| 11.0.9600.20512| 14-Jul-22| 1:08| 811,432 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 46,592 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 56,320 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 57,856 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 2:06| 49,664 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 47,616 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:16| 49,152 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 55,296 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 45,056 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 53,248 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:21| 39,424 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 35,840 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 50,176 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 53,760 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:27| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 53,248 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 50,176 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:35| 30,720 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 30,720 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:37| 30,720 \nInetcpl.cpl| 11.0.9600.20512| 12-Jul-22| 22:10| 2,132,992 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 307,200 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 293,888 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 290,304 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 289,280 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 299,008 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 303,104 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 2:06| 282,112 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 296,960 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:16| 283,648 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:16| 291,840 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 299,520 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 275,968 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 290,816 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 293,376 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 296,960 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:21| 258,048 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 256,512 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:23| 289,280 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 288,256 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 285,184 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 295,424 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 297,472 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:27| 292,864 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 295,424 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 294,400 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 294,400 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 292,864 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 290,816 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 288,768 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 286,208 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 281,600 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 286,720 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:35| 292,352 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 242,176 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:37| 243,200 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 46,080 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 51,712 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 54,272 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 2:06| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 50,688 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 45,056 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:21| 39,936 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 39,424 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 51,200 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 50,688 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:27| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:35| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:35| 35,328 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 35,328 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:37| 35,328 \nJsproxy.dll| 11.0.9600.20512| 12-Jul-22| 22:41| 54,784 \nWininet.dll| 11.0.9600.20512| 12-Jul-22| 22:14| 4,858,880 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 114,176 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 130,560 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 124,928 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 122,880 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 130,048 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 138,240 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 2:06| 114,688 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 131,584 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 117,760 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:16| 122,368 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 134,144 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 107,008 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 123,392 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 127,488 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 128,512 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:21| 88,576 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 82,944 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 125,440 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:23| 123,392 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 120,320 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 130,560 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 125,952 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 128,000 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 124,416 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 121,856 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 115,712 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 125,440 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 72,704 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 73,728 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:37| 73,728 \nMsfeedsbs.dll| 11.0.9600.20512| 12-Jul-22| 22:21| 60,416 \nMsfeedsbs.mof| Not versioned| 12-Jul-22| 20:34| 1,574 \nMsfeedssync.exe| 11.0.9600.20512| 12-Jul-22| 22:48| 13,312 \nMicrosoft-windows-ie-htmlrendering.ptxml| Not versioned| 12-Jul-22| 20:27| 3,228 \nMshtml.dll| 11.0.9600.20512| 12-Jul-22| 23:13| 25,761,280 \nMshtml.tlb| 11.0.9600.20512| 12-Jul-22| 22:58| 2,724,864 \nIeproxy.dll| 11.0.9600.20512| 12-Jul-22| 21:43| 870,400 \nIeshims.dll| 11.0.9600.20512| 12-Jul-22| 21:48| 387,072 \nIertutil.dll| 11.0.9600.20512| 12-Jul-22| 22:52| 2,917,888 \nSqmapi.dll| 6.2.9200.16384| 14-Jul-22| 1:08| 287,160 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 2,066,432 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 2,121,216 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 2,075,648 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 2,063,872 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 2,314,240 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 2,390,528 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 2:06| 2,033,152 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 2,307,584 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:16| 2,255,872 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:16| 2,061,312 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 2,326,016 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 2,019,840 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 2,071,040 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 2,082,816 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 2,307,584 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:21| 2,170,368 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 2,153,984 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:23| 2,291,712 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 2,283,520 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 2,052,096 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 2,301,952 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 2,093,056 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:27| 2,075,648 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 2,299,392 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 2,094,592 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 2,316,800 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 2,305,536 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 2,278,912 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 2,285,568 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 2,060,288 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 2,315,776 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 2,279,424 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:35| 2,324,992 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 2,098,176 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 1,890,304 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:37| 1,890,304 \nIeframe.dll| 11.0.9600.20512| 12-Jul-22| 22:18| 15,509,504 \nIeframe.ptxml| Not versioned| 12-Jul-22| 20:26| 24,486 \nInetres.adml| Not versioned| 14-Jul-22| 1:10| 463,373 \nInetres.adml| Not versioned| 14-Jul-22| 1:11| 751,513 \nInetres.adml| Not versioned| 14-Jul-22| 1:12| 526,343 \nInetres.adml| Not versioned| 14-Jul-22| 1:12| 499,705 \nInetres.adml| Not versioned| 14-Jul-22| 1:13| 552,388 \nInetres.adml| Not versioned| 14-Jul-22| 1:14| 944,610 \nInetres.adml| Not versioned| 14-Jul-22| 2:06| 457,561 \nInetres.adml| Not versioned| 14-Jul-22| 1:15| 543,995 \nInetres.adml| Not versioned| 14-Jul-22| 1:15| 751,230 \nInetres.adml| Not versioned| 14-Jul-22| 1:17| 526,606 \nInetres.adml| Not versioned| 14-Jul-22| 1:17| 575,890 \nInetres.adml| Not versioned| 14-Jul-22| 1:18| 463,373 \nInetres.adml| Not versioned| 14-Jul-22| 1:19| 751,299 \nInetres.adml| Not versioned| 14-Jul-22| 1:20| 570,786 \nInetres.adml| Not versioned| 14-Jul-22| 1:21| 548,170 \nInetres.adml| Not versioned| 14-Jul-22| 1:21| 639,283 \nInetres.adml| Not versioned| 14-Jul-22| 1:22| 525,516 \nInetres.adml| Not versioned| 14-Jul-22| 1:23| 751,362 \nInetres.adml| Not versioned| 14-Jul-22| 1:24| 751,285 \nInetres.adml| Not versioned| 14-Jul-22| 1:25| 488,537 \nInetres.adml| Not versioned| 14-Jul-22| 1:25| 548,544 \nInetres.adml| Not versioned| 14-Jul-22| 1:26| 559,393 \nInetres.adml| Not versioned| 14-Jul-22| 1:27| 535,120 \nInetres.adml| Not versioned| 14-Jul-22| 1:28| 541,504 \nInetres.adml| Not versioned| 14-Jul-22| 1:29| 751,438 \nInetres.adml| Not versioned| 14-Jul-22| 1:29| 804,519 \nInetres.adml| Not versioned| 14-Jul-22| 1:30| 751,380 \nInetres.adml| Not versioned| 14-Jul-22| 1:31| 751,416 \nInetres.adml| Not versioned| 14-Jul-22| 1:32| 751,343 \nInetres.adml| Not versioned| 14-Jul-22| 1:32| 503,961 \nInetres.adml| Not versioned| 14-Jul-22| 1:33| 751,315 \nInetres.adml| Not versioned| 14-Jul-22| 1:34| 521,632 \nInetres.adml| Not versioned| 14-Jul-22| 1:35| 751,484 \nInetres.adml| Not versioned| 14-Jul-22| 1:36| 420,094 \nInetres.adml| Not versioned| 14-Jul-22| 1:37| 436,663 \nInetres.admx| Not versioned| 12-Jul-22| 19:37| 1,678,023 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 29,184 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 35,328 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 37,888 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 2:06| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 27,648 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 33,792 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:21| 23,040 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 22,016 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:23| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 31,232 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 35,840 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:27| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:27| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 34,816 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 32,256 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 30,720 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 16,384 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 16,896 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:37| 16,896 \nJscript9.dll| 11.0.9600.20512| 12-Jul-22| 22:53| 5,508,096 \nJscript9diag.dll| 11.0.9600.20512| 12-Jul-22| 22:37| 814,592 \nJscript.dll| 5.8.9600.20512| 12-Jul-22| 22:38| 785,408 \nVbscript.dll| 5.8.9600.20512| 12-Jul-22| 22:47| 581,120 \nIexplore.exe| 11.0.9600.20512| 13-Jul-22| 22:48| 811,448 \nMshtml.dll| 11.0.9600.20512| 12-Jul-22| 4:40| 20,296,192 \nMshtml.tlb| 11.0.9600.20512| 12-Jul-22| 4:31| 2,724,864 \nWow64_microsoft-windows-ie-htmlrendering.ptxml| Not versioned| 12-Jul-22| 2:29| 3,228 \nIe9props.propdesc| Not versioned| 30-Jun-22| 2:05| 2,843 \nIeframe.dll| 11.0.9600.20512| 12-Jul-22| 4:04| 13,885,440 \nWow64_ieframe.ptxml| Not versioned| 12-Jul-22| 2:29| 24,486 \nJscript9.dll| 11.0.9600.20512| 12-Jul-22| 4:08| 4,119,040 \nJscript9diag.dll| 11.0.9600.20512| 12-Jul-22| 4:15| 620,032 \nJscript.dll| 5.8.9600.20512| 12-Jul-22| 4:16| 653,824 \nVbscript.dll| 5.8.9600.20512| 12-Jul-22| 4:23| 498,176 \nHlink.dll| 6.3.9600.20512| 12-Jul-22| 4:11| 103,936 \nUrlmon.dll| 11.0.9600.20512| 12-Jul-22| 3:45| 1,342,976 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 46,592 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 56,320 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 57,856 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:43| 49,664 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 47,616 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 49,152 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 55,296 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 45,056 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 53,248 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 39,424 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 35,840 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 50,176 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 53,760 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 53,248 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 50,176 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 30,720 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 30,720 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 30,720 \nInetcpl.cpl| 11.0.9600.20512| 12-Jul-22| 3:57| 2,058,752 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 307,200 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 293,888 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 290,304 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 289,280 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 299,008 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 303,104 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 282,112 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 296,960 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 283,648 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 291,840 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 299,520 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 275,968 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 290,816 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 293,376 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 296,960 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 258,048 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 256,512 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 289,280 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 288,256 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 285,184 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 295,424 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 297,472 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 292,864 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 295,424 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 294,400 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 294,400 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 292,864 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 290,816 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 288,768 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 286,208 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 281,600 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 286,720 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 292,352 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 242,176 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 243,200 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 46,080 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 51,712 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 54,272 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 50,688 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 45,056 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 39,936 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 39,424 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 51,200 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 50,688 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 35,328 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 35,328 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:19| 35,328 \nJsproxy.dll| 11.0.9600.20512| 12-Jul-22| 4:18| 47,104 \nWininet.dll| 11.0.9600.20512| 12-Jul-22| 3:48| 4,387,840 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 114,176 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 130,560 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 124,928 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 122,880 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 130,048 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 138,240 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 114,688 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 131,584 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 117,760 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 122,368 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 134,144 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 107,008 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 123,392 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 127,488 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 128,512 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 88,576 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 82,944 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 125,440 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 123,392 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 120,320 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 130,560 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 125,952 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 128,000 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 124,416 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 121,856 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 115,712 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 125,440 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 72,704 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 73,728 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 73,728 \nMsfeedsbs.dll| 11.0.9600.20512| 12-Jul-22| 4:04| 52,736 \nMsfeedsbs.mof| Not versioned| 12-Jul-22| 2:34| 1,574 \nMsfeedssync.exe| 11.0.9600.20512| 12-Jul-22| 4:23| 11,776 \nIeproxy.dll| 11.0.9600.20512| 12-Jul-22| 3:40| 310,784 \nIeshims.dll| 11.0.9600.20512| 12-Jul-22| 3:43| 290,304 \nIertutil.dll| 11.0.9600.20512| 12-Jul-22| 4:22| 2,309,120 \nSqmapi.dll| 6.2.9200.16384| 13-Jul-22| 22:48| 229,304 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 2,066,432 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 2,121,216 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 2,075,648 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 2,063,872 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 2,314,240 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 2,390,528 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 2,033,152 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 2,307,584 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 2,255,872 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 2,061,312 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 2,326,016 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 2,019,840 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 2,071,040 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 2,082,816 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 2,307,584 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 2,170,368 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 2,153,984 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 2,291,712 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 2,283,520 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 2,052,096 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 2,301,952 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 2,093,056 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 2,075,648 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 2,299,392 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 2,094,592 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 2,316,800 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 2,305,536 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 2,278,912 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 2,285,568 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 2,060,288 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 2,315,776 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 2,279,424 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 2,324,992 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 2,098,176 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 1,890,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 29,184 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 35,328 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 37,888 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:43| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 27,648 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 33,792 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 23,040 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 22,016 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 31,232 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 35,840 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 34,816 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 32,256 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 30,720 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 16,384 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 16,896 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 16,896 \nPackage.cab| Not versioned| 14-Jul-22| 9:52| 301,903 \n \n### **Windows 7 and Windows Server 2008 R2**\n\n## \n\n__\n\nInternet Explorer 11 on all supported x86-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nurlmon.dll| 11.0.9600.20512| 11-Jul-2022| 20:45| 1,342,976 \niexplore.exe| 11.0.9600.20512| 13-Jul-2022| 15:54| 811,440 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 31,744 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 36,352 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 35,328 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 36,864 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 39,424 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 32,768 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 37,376 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 33,280 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 38,400 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 30,720 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 35,328 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 36,864 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 25,600 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 24,576 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 36,352 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 33,280 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 20,992 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 21,504 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 21,504 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 30,720 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 30,720 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 30,720 \ninetcpl.cpl| 11.0.9600.20512| 11-Jul-2022| 20:57| 2,058,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 10,752 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 288,768 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:26| 243,200 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 73,728 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 78,848 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 74,752 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 62,464 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 75,264 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 72,192 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 73,216 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 41,472 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 37,888 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 70,656 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 71,680 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 69,632 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 59,904 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 69,120 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 29,696 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 30,720 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 30,720 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 60,416 \nDiagnosticsHub.ScriptedSandboxPlugin.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 230,912 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 35,328 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 11,264 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 9,216 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 7,680 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 7,680 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 6,656 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 6,656 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:26| 6,656 \nwininet.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 4,387,840 \njsproxy.dll| 11.0.9600.20512| 11-Jul-2022| 21:18| 47,104 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 88,576 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 72,704 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 73,728 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 73,728 \niedkcs32.dll| 18.0.9600.20512| 13-Jul-2022| 15:54| 342,944 \ninstall.ins| Not versioned| 11-Jul-2022| 19:17| 464 \nieapfltr.dat| 10.0.9301.0| 29-Jun-2022| 19:04| 616,104 \nieapfltr.dll| 11.0.9600.20512| 11-Jul-2022| 20:41| 710,656 \ntdc.ocx| 11.0.9600.20512| 11-Jul-2022| 21:06| 73,728 \nDiagnosticsHub.DataWarehouse.dll| 11.0.9600.20512| 11-Jul-2022| 21:25| 489,472 \niedvtool.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 772,608 \nDiagnosticsHub_is.dll| 11.0.9600.20512| 11-Jul-2022| 21:26| 38,912 \ndxtmsft.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 415,744 \ndxtrans.dll| 11.0.9600.20512| 11-Jul-2022| 21:03| 280,064 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 3,584 \nF12.dll| 11.0.9600.20512| 11-Jul-2022| 21:01| 1,207,808 \nDiagnosticsTap.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 175,104 \nMicrosoft-Windows-IE-F12-Provider.ptxml| Not versioned| 11-Jul-2022| 19:27| 11,892 \nF12Resources.dll| 11.0.9600.20512| 11-Jul-2022| 21:28| 10,948,096 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 2,048 \nF12Tools.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 256,000 \nmsfeedsbs.mof| Not versioned| 11-Jul-2022| 19:34| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 52,736 \nmsfeedssync.exe| 11.0.9600.20512| 11-Jul-2022| 21:23| 11,776 \nmsfeeds.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 696,320 \nmsfeeds.mof| Not versioned| 11-Jul-2022| 19:34| 1,518 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 2,066,432 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 2,121,216 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 2,075,648 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 2,063,872 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 2,314,240 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 2,390,528 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 2,033,152 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 2,307,584 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 2,255,872 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 2,061,312 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 2,326,016 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 2,019,840 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,071,040 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,082,816 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 2,307,584 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 2,170,368 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 2,153,984 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 2,291,712 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 2,283,520 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 2,052,096 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 2,301,952 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,093,056 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,075,648 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 2,299,392 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 2,094,592 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 2,316,800 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 2,305,536 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 2,278,912 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 2,285,568 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 2,060,288 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 2,315,776 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 2,279,424 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 2,324,992 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 2,098,176 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 1,890,304 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:26| 1,890,304 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 3,072 \nieframe.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 13,885,440 \nieui.dll| 11.0.9600.20512| 11-Jul-2022| 21:16| 476,160 \nieframe.ptxml| Not versioned| 11-Jul-2022| 19:27| 24,486 \nhtml.iec| 2019.0.0.20512| 11-Jul-2022| 21:22| 341,504 \nmshtmled.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 76,800 \nmshtml.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 20,296,192 \nmshtml.tlb| 11.0.9600.20512| 11-Jul-2022| 21:31| 2,724,864 \nMicrosoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 11-Jul-2022| 19:27| 3,228 \nmshtmlmedia.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 1,155,584 \nieetwcollector.exe| 11.0.9600.20512| 11-Jul-2022| 21:16| 104,960 \nieetwproxystub.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 47,616 \nieetwcollectorres.dll| 11.0.9600.20512| 11-Jul-2022| 21:31| 4,096 \nielowutil.exe| 11.0.9600.20512| 11-Jul-2022| 21:17| 221,184 \nieproxy.dll| 11.0.9600.20512| 11-Jul-2022| 20:40| 310,784 \nIEShims.dll| 11.0.9600.20512| 11-Jul-2022| 20:43| 290,304 \nieinstal.exe| 11.0.9600.20512| 11-Jul-2022| 21:03| 475,648 \nWindows Pop-up Blocked.wav| Not versioned| 29-Jun-2022| 19:06| 85,548 \nWindows Information Bar.wav| Not versioned| 29-Jun-2022| 19:06| 23,308 \nWindows Feed Discovered.wav| Not versioned| 29-Jun-2022| 19:06| 19,884 \nWindows Navigation Start.wav| Not versioned| 29-Jun-2022| 19:06| 11,340 \nbing.ico| Not versioned| 29-Jun-2022| 19:05| 5,430 \nieUnatt.exe| 11.0.9600.20512| 11-Jul-2022| 21:15| 115,712 \nMicrosoft-Windows-IE-InternetExplorer-ppdlic.xrm-ms| Not versioned| 13-Jul-2022| 18:50| 2,956 \njsprofilerui.dll| 11.0.9600.20512| 11-Jul-2022| 21:05| 579,584 \nMemoryAnalyzer.dll| 11.0.9600.20512| 11-Jul-2022| 21:14| 1,399,296 \nMshtmlDac.dll| 11.0.9600.20512| 11-Jul-2022| 21:21| 64,000 \nnetworkinspection.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 1,075,200 \noccache.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 130,048 \ndesktop.ini| Not versioned| 29-Jun-2022| 19:04| 65 \nwebcheck.dll| 11.0.9600.20512| 11-Jul-2022| 20:58| 230,400 \ndesktop.ini| Not versioned| 29-Jun-2022| 19:04| 65 \nmsrating.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 168,960 \nicrav03.rat| Not versioned| 29-Jun-2022| 19:04| 8,798 \nticrf.rat| Not versioned| 29-Jun-2022| 19:04| 1,988 \niertutil.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 2,309,120 \nsqmapi.dll| 6.2.9200.16384| 13-Jul-2022| 15:54| 229,280 \ninseng.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 91,136 \nie4uinit.exe| 11.0.9600.20512| 11-Jul-2022| 20:57| 692,224 \niernonce.dll| 11.0.9600.20512| 11-Jul-2022| 21:17| 30,720 \niesetup.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 62,464 \nieuinit.inf| Not versioned| 11-Jul-2022| 20:25| 16,303 \nTimeline.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 154,112 \nTimeline_is.dll| 11.0.9600.20512| 11-Jul-2022| 21:18| 124,928 \nTimeline.cpu.xml| Not versioned| 29-Jun-2022| 19:04| 3,197 \nVGX.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 818,176 \nInetRes.adml| Not versioned| 13-Jul-2022| 15:56| 463,373 \nInetRes.adml| Not versioned| 13-Jul-2022| 15:57| 751,228 \nInetRes.adml| Not versioned| 13-Jul-2022| 15:58| 526,345 \nInetRes.adml| Not versioned| 13-Jul-2022| 15:58| 499,706 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:00| 552,385 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:01| 944,611 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:51| 457,561 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:01| 543,995 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:02| 751,322 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:03| 526,608 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:04| 575,886 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:05| 463,373 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:06| 751,347 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:07| 570,788 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:07| 548,173 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:08| 639,283 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:09| 525,516 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:10| 751,330 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:11| 751,298 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:12| 488,539 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:12| 548,543 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:14| 559,395 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:15| 535,116 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:16| 541,504 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:16| 751,467 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:17| 804,519 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:18| 751,243 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:18| 751,362 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:20| 751,387 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:20| 503,959 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:21| 751,443 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:22| 521,632 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:23| 751,358 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:24| 420,094 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:25| 436,663 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:26| 436,663 \ninetres.admx| Not versioned| 29-Jun-2022| 19:09| 1,678,023 \nMsSpellCheckingFacility.exe| 6.3.9600.20512| 11-Jul-2022| 21:12| 668,672 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 29,184 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 35,328 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 37,888 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 27,648 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 33,792 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 23,040 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 22,016 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 31,232 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 35,840 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 34,816 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 32,256 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 30,720 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 16,384 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 16,896 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 16,896 \njscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:16| 653,824 \njscript9.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 4,119,040 \njscript9diag.dll| 11.0.9600.20512| 11-Jul-2022| 21:15| 620,032 \nvbscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:23| 498,176 \n \n## \n\n__\n\nInternet Explorer 11 on all supported x64-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nurlmon.dll| 11.0.9600.20512| 12-Jul-2022| 15:00| 1,563,648 \niexplore.exe| 11.0.9600.20512| 13-Jul-2022| 18:15| 811,448 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 31,744 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 36,352 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 35,328 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 36,864 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 39,424 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 32,768 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 37,376 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 33,280 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 38,400 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 30,720 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 35,328 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 36,864 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 25,600 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 24,576 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 36,352 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 33,280 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 20,992 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 21,504 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 21,504 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 30,720 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 30,720 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 30,720 \ninetcpl.cpl| 11.0.9600.20512| 12-Jul-2022| 15:10| 2,132,992 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 10,752 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 288,768 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 243,200 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 73,728 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 78,848 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 74,752 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 62,464 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 75,264 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 72,192 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 73,216 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 41,472 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 37,888 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 70,656 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 71,680 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 69,632 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 59,904 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 69,120 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 29,696 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 30,720 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 30,720 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 12-Jul-2022| 15:25| 77,824 \nDiagnosticsHub.ScriptedSandboxPlugin.dll| 11.0.9600.20512| 12-Jul-2022| 15:26| 276,480 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 35,328 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 11,264 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 9,216 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 7,680 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 7,680 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 6,656 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 6,656 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 6,656 \nwininet.dll| 11.0.9600.20512| 12-Jul-2022| 15:14| 4,858,880 \njsproxy.dll| 11.0.9600.20512| 12-Jul-2022| 15:41| 54,784 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 88,576 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 72,704 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 73,728 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 73,728 \niedkcs32.dll| 18.0.9600.20512| 13-Jul-2022| 18:15| 391,608 \ninstall.ins| Not versioned| 12-Jul-2022| 13:18| 464 \nieapfltr.dat| 10.0.9301.0| 7-Jul-2022| 17:17| 616,104 \nieapfltr.dll| 11.0.9600.20512| 12-Jul-2022| 14:44| 800,768 \ntdc.ocx| 11.0.9600.20512| 12-Jul-2022| 15:24| 88,064 \nDiagnosticsHub.DataWarehouse.dll| 11.0.9600.20512| 12-Jul-2022| 15:50| 666,624 \niedvtool.dll| 11.0.9600.20512| 12-Jul-2022| 16:13| 950,784 \nDiagnosticsHub_is.dll| 11.0.9600.20512| 12-Jul-2022| 15:51| 50,176 \ndxtmsft.dll| 11.0.9600.20512| 12-Jul-2022| 15:30| 491,008 \ndxtrans.dll| 11.0.9600.20512| 12-Jul-2022| 15:20| 316,416 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 3,584 \nF12.dll| 11.0.9600.20512| 12-Jul-2022| 15:18| 1,422,848 \nDiagnosticsTap.dll| 11.0.9600.20512| 12-Jul-2022| 15:29| 245,248 \nMicrosoft-Windows-IE-F12-Provider.ptxml| Not versioned| 12-Jul-2022| 13:27| 11,892 \nF12Resources.dll| 11.0.9600.20512| 12-Jul-2022| 15:54| 10,949,120 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 2,048 \nF12Tools.dll| 11.0.9600.20512| 12-Jul-2022| 15:28| 372,224 \nmsfeedsbs.mof| Not versioned| 12-Jul-2022| 13:34| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 60,416 \nmsfeedssync.exe| 11.0.9600.20512| 12-Jul-2022| 15:48| 13,312 \nmsfeeds.dll| 11.0.9600.20512| 12-Jul-2022| 15:10| 809,472 \nmsfeeds.mof| Not versioned| 12-Jul-2022| 13:34| 1,518 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 2,066,432 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 2,121,216 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 2,075,648 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 2,063,872 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 2,314,240 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 2,390,528 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 2,033,152 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 2,307,584 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 2,255,872 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 2,061,312 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 2,326,016 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 2,019,840 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 2,071,040 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 2,082,816 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 2,307,584 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 2,170,368 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 2,153,984 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 2,291,712 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 2,283,520 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 2,052,096 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 2,301,952 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 2,093,056 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 2,075,648 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 2,299,392 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 2,094,592 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 2,316,800 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 2,305,536 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 2,278,912 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 2,285,568 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 2,060,288 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 2,315,776 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 2,279,424 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 2,324,992 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 2,098,176 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 1,890,304 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:45| 1,890,304 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 3,072 \nieframe.dll| 11.0.9600.20512| 12-Jul-2022| 15:18| 15,509,504 \nieui.dll| 11.0.9600.20512| 12-Jul-2022| 15:39| 615,936 \nieframe.ptxml| Not versioned| 12-Jul-2022| 13:26| 24,486 \nhtml.iec| 2019.0.0.20512| 12-Jul-2022| 15:47| 417,280 \nmshtmled.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 92,672 \nmshtml.dll| 11.0.9600.20512| 12-Jul-2022| 16:13| 25,761,280 \nmshtml.tlb| 11.0.9600.20512| 12-Jul-2022| 15:58| 2,724,864 \nMicrosoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 12-Jul-2022| 13:27| 3,228 \nmshtmlmedia.dll| 11.0.9600.20512| 12-Jul-2022| 15:10| 1,359,872 \nieetwcollector.exe| 11.0.9600.20512| 12-Jul-2022| 15:38| 116,224 \nieetwproxystub.dll| 11.0.9600.20512| 12-Jul-2022| 15:47| 48,640 \nieetwcollectorres.dll| 11.0.9600.20512| 12-Jul-2022| 15:58| 4,096 \nielowutil.exe| 11.0.9600.20512| 12-Jul-2022| 15:40| 222,720 \nieproxy.dll| 11.0.9600.20512| 12-Jul-2022| 14:43| 870,400 \nIEShims.dll| 11.0.9600.20512| 12-Jul-2022| 14:48| 387,072 \nieinstal.exe| 11.0.9600.20512| 12-Jul-2022| 15:20| 492,032 \nWindows Pop-up Blocked.wav| Not versioned| 7-Jul-2022| 17:30| 85,548 \nWindows Information Bar.wav| Not versioned| 7-Jul-2022| 17:30| 23,308 \nWindows Feed Discovered.wav| Not versioned| 7-Jul-2022| 17:30| 19,884 \nWindows Navigation Start.wav| Not versioned| 7-Jul-2022| 17:30| 11,340 \nbing.ico| Not versioned| 7-Jul-2022| 17:24| 5,430 \nieUnatt.exe| 11.0.9600.20512| 12-Jul-2022| 15:38| 144,384 \nMicrosoft-Windows-IE-InternetExplorer-ppdlic.xrm-ms| Not versioned| 13-Jul-2022| 19:11| 2,956 \njsprofilerui.dll| 11.0.9600.20512| 12-Jul-2022| 15:23| 628,736 \nMemoryAnalyzer.dll| 11.0.9600.20512| 12-Jul-2022| 15:36| 1,862,656 \nMshtmlDac.dll| 11.0.9600.20512| 12-Jul-2022| 15:46| 88,064 \nnetworkinspection.dll| 11.0.9600.20512| 12-Jul-2022| 15:18| 1,217,024 \noccache.dll| 11.0.9600.20512| 12-Jul-2022| 15:19| 152,064 \ndesktop.ini| Not versioned| 7-Jul-2022| 17:20| 65 \nwebcheck.dll| 11.0.9600.20512| 12-Jul-2022| 15:12| 262,144 \ndesktop.ini| Not versioned| 7-Jul-2022| 17:20| 65 \nmsrating.dll| 11.0.9600.20512| 12-Jul-2022| 15:22| 199,680 \nicrav03.rat| Not versioned| 7-Jul-2022| 17:20| 8,798 \nticrf.rat| Not versioned| 7-Jul-2022| 17:20| 1,988 \niertutil.dll| 11.0.9600.20512| 12-Jul-2022| 15:52| 2,917,888 \nsqmapi.dll| 6.2.9200.16384| 13-Jul-2022| 18:15| 287,160 \ninseng.dll| 11.0.9600.20512| 12-Jul-2022| 15:24| 107,520 \nie4uinit.exe| 11.0.9600.20512| 12-Jul-2022| 15:10| 728,064 \niernonce.dll| 11.0.9600.20512| 12-Jul-2022| 15:41| 34,304 \niesetup.dll| 11.0.9600.20512| 12-Jul-2022| 15:47| 66,560 \nieuinit.inf| Not versioned| 12-Jul-2022| 14:27| 16,303 \nTimeline.dll| 11.0.9600.20512| 12-Jul-2022| 15:24| 219,648 \nTimeline_is.dll| 11.0.9600.20512| 12-Jul-2022| 15:41| 172,032 \nTimeline.cpu.xml| Not versioned| 7-Jul-2022| 17:20| 3,197 \nVGX.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 1,018,880 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:18| 463,373 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:19| 751,409 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:20| 526,344 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:20| 499,703 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:21| 552,387 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:22| 944,611 \nInetRes.adml| Not versioned| 13-Jul-2022| 19:12| 457,561 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:22| 543,998 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:23| 751,514 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:24| 526,607 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:25| 575,886 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:26| 463,373 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:26| 751,324 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:27| 570,788 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:28| 548,171 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:29| 639,283 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:30| 525,516 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:30| 751,192 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:31| 751,355 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:32| 488,539 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:32| 548,543 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:33| 559,394 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:34| 535,117 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:35| 541,504 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:36| 751,453 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:37| 804,521 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:37| 751,267 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:38| 751,412 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:39| 751,409 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:40| 503,958 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:40| 751,415 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:41| 521,634 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:42| 751,348 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:43| 420,094 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:44| 436,663 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:44| 436,663 \ninetres.admx| Not versioned| 12-Jul-2022| 12:37| 1,678,023 \nMsSpellCheckingFacility.exe| 6.3.9600.20512| 12-Jul-2022| 15:33| 970,752 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 29,184 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 35,328 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 37,888 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 27,648 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 33,792 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 23,040 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 22,016 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 31,232 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 35,840 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 34,816 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 32,256 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 30,720 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 16,384 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 16,896 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 16,896 \njscript.dll| 5.8.9600.20512| 12-Jul-2022| 15:38| 785,408 \njscript9.dll| 11.0.9600.20512| 12-Jul-2022| 15:53| 5,508,096 \njscript9diag.dll| 11.0.9600.20512| 12-Jul-2022| 15:37| 814,592 \nvbscript.dll| 5.8.9600.20512| 12-Jul-2022| 15:47| 581,120 \niexplore.exe| 11.0.9600.20512| 13-Jul-2022| 15:54| 811,440 \ntdc.ocx| 11.0.9600.20512| 11-Jul-2022| 21:06| 73,728 \ndxtmsft.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 415,744 \ndxtrans.dll| 11.0.9600.20512| 11-Jul-2022| 21:03| 280,064 \nmsfeeds.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 696,320 \nmsfeeds.mof| Not versioned| 11-Jul-2022| 19:34| 1,518 \nieframe.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 13,885,440 \nieui.dll| 11.0.9600.20512| 11-Jul-2022| 21:16| 476,160 \nie9props.propdesc| Not versioned| 29-Jun-2022| 19:05| 2,843 \nwow64_ieframe.ptxml| Not versioned| 11-Jul-2022| 19:29| 24,486 \nmshtmled.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 76,800 \nmshtml.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 20,296,192 \nmshtml.tlb| 11.0.9600.20512| 11-Jul-2022| 21:31| 2,724,864 \nwow64_Microsoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 11-Jul-2022| 19:29| 3,228 \nmshtmlmedia.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 1,155,584 \nieetwproxystub.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 47,616 \nieUnatt.exe| 11.0.9600.20512| 11-Jul-2022| 21:15| 115,712 \noccache.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 130,048 \nwebcheck.dll| 11.0.9600.20512| 11-Jul-2022| 20:58| 230,400 \niernonce.dll| 11.0.9600.20512| 11-Jul-2022| 21:17| 30,720 \niesetup.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 62,464 \nieuinit.inf| Not versioned| 11-Jul-2022| 20:25| 16,303 \njscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:16| 653,824 \njscript9.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 4,119,040 \njscript9diag.dll| 11.0.9600.20512| 11-Jul-2022| 21:15| 620,032 \nvbscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:23| 498,176 \nurlmon.dll| 11.0.9600.20512| 11-Jul-2022| 20:45| 1,342,976 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 31,744 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 36,352 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 35,328 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 36,864 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 39,424 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 32,768 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 37,376 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 33,280 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 38,400 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 30,720 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 35,328 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 36,864 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 25,600 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 24,576 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 36,352 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 33,280 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 20,992 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 21,504 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 21,504 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 30,720 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 30,720 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 30,720 \ninetcpl.cpl| 11.0.9600.20512| 11-Jul-2022| 20:57| 2,058,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 10,752 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 288,768 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:26| 243,200 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 60,416 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 35,328 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 11,264 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 9,216 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 7,680 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 7,680 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 6,656 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 6,656 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:26| 6,656 \nwininet.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 4,387,840 \njsproxy.dll| 11.0.9600.20512| 11-Jul-2022| 21:18| 47,104 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 88,576 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 72,704 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 73,728 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 73,728 \niedkcs32.dll| 18.0.9600.20512| 13-Jul-2022| 15:54| 342,944 \ninstall.ins| Not versioned| 11-Jul-2022| 19:17| 464 \nieapfltr.dat| 10.0.9301.0| 29-Jun-2022| 19:04| 616,104 \nieapfltr.dll| 11.0.9600.20512| 11-Jul-2022| 20:41| 710,656 \niedvtool.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 772,608 \nDiagnosticsTap.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 175,104 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 2,048 \nF12Tools.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 256,000 \nmsfeedsbs.mof| Not versioned| 11-Jul-2022| 19:34| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 52,736 \nmsfeedssync.exe| 11.0.9600.20512| 11-Jul-2022| 21:23| 11,776 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 2,066,432 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 2,121,216 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 2,075,648 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 2,063,872 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 2,314,240 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 2,390,528 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 2,033,152 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 2,307,584 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 2,255,872 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 2,061,312 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 2,326,016 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 2,019,840 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,071,040 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,082,816 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 2,307,584 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 2,170,368 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 2,153,984 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 2,291,712 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 2,283,520 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 2,052,096 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 2,301,952 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,093,056 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,075,648 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 2,299,392 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 2,094,592 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 2,316,800 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 2,305,536 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 2,278,912 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 2,285,568 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 2,060,288 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 2,315,776 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 2,279,424 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 2,324,992 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 2,098,176 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 1,890,304 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:26| 1,890,304 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 3,072 \nhtml.iec| 2019.0.0.20512| 11-Jul-2022| 21:22| 341,504 \nielowutil.exe| 11.0.9600.20512| 11-Jul-2022| 21:17| 221,184 \nieproxy.dll| 11.0.9600.20512| 11-Jul-2022| 20:40| 310,784 \nIEShims.dll| 11.0.9600.20512| 11-Jul-2022| 20:43| 290,304 \nieinstal.exe| 11.0.9600.20512| 11-Jul-2022| 21:03| 475,648 \njsprofilerui.dll| 11.0.9600.20512| 11-Jul-2022| 21:05| 579,584 \nMshtmlDac.dll| 11.0.9600.20512| 11-Jul-2022| 21:21| 64,000 \nnetworkinspection.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 1,075,200 \nmsrating.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 168,960 \nicrav03.rat| Not versioned| 29-Jun-2022| 19:04| 8,798 \nticrf.rat| Not versioned| 29-Jun-2022| 19:04| 1,988 \niertutil.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 2,309,120 \nsqmapi.dll| 6.2.9200.16384| 13-Jul-2022| 15:54| 229,280 \ninseng.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 91,136 \nVGX.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 818,176 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 29,184 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 35,328 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 37,888 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 27,648 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 33,792 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 23,040 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 22,016 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 31,232 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 35,840 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 34,816 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 32,256 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 30,720 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 16,384 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 16,896 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 16,896 \n \n## **Information about protection and security**\n\n * Protect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151/windows-security-help>)\n * Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mskb", "title": "KB5016618: Cumulative security update for Internet Explorer: August 9, 2022", "bulletinFamily": "microsoft", "cvss2": {}, "cvelist": ["CVE-2022-35768"], "modified": "2022-08-09T07:00:00", "id": "KB5016618", "href": "https://support.microsoft.com/en-us/help/5016618", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T10:54:11", "description": "None\n**NEW 8/26/22****IMPORTANT **Microsoft released [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n**7/12/22** \nAfter September 20, 2022, there will no longer be optional, non-security releases (known as \"C\" or preview releases) for the 2019 LTSC editions and Windows Server 2019. Only cumulative monthly security updates (known as the \"B\" or Update Tuesday release) will continue for the 2019 LTSC editions and Windows Server 2019. \n\n**11/17/20** \nFor information about Windows update terminology, see the article about the [types of Windows updates](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) and the [monthly quality update types](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-quality-updates-primer/ba-p/2569385>). For an overview of Windows 10, version 1809, see its update history page. \n\n## Highlights \n\n * Addresses security issues for your Windows operating system. \n\n## Improvements\n\nThis security update includes improvements that were a part of update KB5015880 (released July 21, 2022) and also addresses the following issues:\n\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\nIf you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device.For more information about security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n### Windows 10 servicing stack update - 17763.3232\n\nThis update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates. \n\n## Known issues in this update\n\n### \n\n__\n\nClick or tap to view the known issues\n\n**Symptom**| **Workaround** \n---|--- \nAfter installing KB4493509, devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"| This issue is addressed by updates released June 11, 2019 and later. We recommend you install the latest security updates for your device. Customers installing Windows Server 2019 using media should install the latest [Servicing Stack Update (SSU)](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) before installing the language pack or other optional components. If using the [Volume Licensing Service Center (VLSC)](<https://www.microsoft.com/licensing/servicecenter/default.aspx>), acquire the latest Windows Server 2019 media available. The proper order of installation is as follows:\n\n 1. Install the latest prerequisite SSU, currently [KB5005112](<https://support.microsoft.com/help/5005112>)\n 2. Install optional components or language packs\n 3. Install latest cumulative update\n**Note** Updating your device will prevent this issue, but will have no effect on devices already affected by this issue. If this issue is present in your device, you will need to use the workaround steps to repair it.**Workaround:**\n\n 1. Uninstall and reinstall any recently added language packs. For instructions, see [Manage the input and display language settings in Windows 10](<https://support.microsoft.com/windows/manage-the-input-and-display-language-settings-in-windows-12a10cb4-8626-9b77-0ccb-5013e0c7c7a2>).\n 2. Click **Check for Updates **and install the April 2019 Cumulative Update or later. For instructions, see [Update Windows 10](<https://support.microsoft.com/windows/update-windows-3c5ae7fc-9fb6-9af1-1984-b5e0412c556a>).\n**Note **If reinstalling the language pack does not mitigate the issue, use the In-Place-Upgrade feature. For guidance, see [How to do an in-place upgrade on Windows](<https://docs.microsoft.com/troubleshoot/windows-server/deployment/repair-or-in-place-upgrade>), and [Perform an in-place upgrade of Windows Server](<https://docs.microsoft.com/windows-server/get-started/perform-in-place-upgrade>). \nAfter installing KB5001342 or later, the Cluster Service might fail to start because a Cluster Network Driver is not found.| This issue occurs because of an update to the PnP class drivers used by this service. After about 20 minutes, you should be able to restart your device and not encounter this issue. \nFor more information about the specific errors, cause, and workaround for this issue, please see KB5003571. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is addressed in KB5017379. \n \n## How to get this update\n\n**Before installing this update**Microsoft now combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). SSUs improve the reliability of the update process to mitigate potential issues while installing the LCU. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/topic/servicing-stack-updates-ssu-frequently-asked-questions-06b62771-1cb0-368c-09cf-87c4efc4f2fe>).Prerequisite:You **must **install the August 10, 2021 SSU (KB5005112) before installing the LCU. **Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nWindows Update for Business| Yes| None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016623>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 10**Classification**: Security Updates \n \n**If you want to remove the LCU**To remove the LCU after installing the combined SSU and LCU package, use the [DISM/Remove-Package](<https://docs.microsoft.com/windows-hardware/manufacture/desktop/dism-operating-system-package-servicing-command-line-options>) command line option with the LCU package name as the argument. You can find the package name by using this command: **DISM /online /get-packages**.Running [Windows Update Standalone Installer](<https://support.microsoft.com/topic/description-of-the-windows-update-standalone-installer-in-windows-799ba3df-ec7e-b05e-ee13-1cdae8f23b19>) (**wusa.exe**) with the **/uninstall **switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.\n\n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 5016623](<https://download.microsoft.com/download/8/a/8/8a85b65e-7837-4878-a25b-b094c3442c82/5016623.csv>).For a list of the files that are provided in the servicing stack update, download the [file information for the SSU - version 17763.3232](<https://download.microsoft.com/download/f/5/1/f51753ae-66cd-4568-8fb6-5a5cbf79186c/SSU_version_17763_3232.csv>). \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-10-11T07:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016623 (OS Build 17763.3287)", "bulletinFamily": "microsoft", "cvss2": {}, "cvelist": ["CVE-2022-34689"], "modified": "2022-10-11T07:00:00", "id": "KB5016623", "href": "https://support.microsoft.com/en-us/help/5016623", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T10:54:11", "description": "None\n## **Summary**\n\nLearn more about this cumulative security update, including improvements, any known issues, and how to get the update.\n\n**IMPORTANT **Windows Server 2008 Service Pack 2 (SP2) has reached the end of mainstream support and is now in extended support. Starting in July 2020, there will no longer be optional, non-security releases (known as \"C\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).Verify that** **you have installed the required updates in the **How to get this update** section before installing this update. Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of this OS must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ended on January 14, 2020. For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>). Because ESU is available as a separate SKU for each of the years in which they are offered (2020, 2021, and 2022)\u2014and because ESU can only be purchased in [specific 12-month periods](<https://docs.microsoft.com/lifecycle/faq/extended-security-updates>)\u2014you must purchase the third year of ESU coverage separately and activate a new key on each applicable device for your devices to continue receiving security updates in 2022.If your organization did not purchase the third year of ESU coverage, you must purchase Year 1, Year 2, and Year 3 ESU for your applicable Windows Server 2008 SP2 devices before you install and activate the Year 3 MAK keys to receive updates. The steps to [install, activate, and deploy ESUs](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) are the same for first, second, and third year coverage. For more information, see [Obtaining Extended Security Updates for eligible Windows devices](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) for the Volume Licensing process and [Purchasing Windows 7 ESUs as a Cloud Solution Provider](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/purchasing-windows-7-esus-as-a-cloud-solution-provider/ba-p/1034637>) for the CSP process. For embedded devices, contact your original equipment manufacturer (OEM).For more information, see the [ESU blog](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-extended-security-updates-for-windows-7-and-windows/ba-p/1872910>).\n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages for Windows Server 2008 SP2, see the following update history [home page](<https://support.microsoft.com/help/4343218>).\n\n## **Improvements**\n\nThis cumulative security update contains improvements that are part of update [KB5015866](<https://support.microsoft.com/help/5015866>) (released July 12, 2022) and includes new improvements for the following issue:\n\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptom**| **Next step** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \u201cFailure to configure Windows updates. Reverting Changes. Do not turn off your computer\u201d, and the update might show as **Failed** in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\nIf you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://aka.ms/Windows7ESU>) post. For information on the prerequisites, see the \"How to get this update\" section of this article. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n\u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.| This issue is resolved in [update KB5018450](<https://support.microsoft.com/help/5018450>). \n \n## **How to get this update**\n\n**Before installing this update****IMPORTANT** Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of these operating systems must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates because extended support ended on January 14, 2020.For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Prerequisite**You must install the updates listed below and **restart your device** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The April 9, 2019 servicing stack update (SSU) ([KB4493730](<https://support.microsoft.com/help/4493730>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released October 8, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. The Extended Security Updates (ESU) Licensing Preparation Package ([KB4538484](<https://support.microsoft.com/help/4538484>)) or the Update for the Extended Security Updates (ESU) Licensing Preparation Package ([KB4575904](<https://support.microsoft.com/help/4575904>)). The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter installing the items above, Microsoft strongly recommends that you install the latest SSU ([KB5016129](<https://support.microsoft.com/help/5016129>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update if you are an ESU customer. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016669>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2008 Service Pack 2**Classification**: Security Updates \n \n## **File information**\n\nFor a list of the files that are provided in this update, download the [file information for update KB5016669](<https://download.microsoft.com/download/3/1/f/31f985fd-a8b3-4a9e-a3b4-b0d1bf0cf997/5016669.csv>).\n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-10-11T07:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016669 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {}, "cvelist": ["CVE-2022-34689"], "modified": "2022-10-11T07:00:00", "id": "KB5016669", "href": "https://support.microsoft.com/en-us/help/5016669", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T10:54:13", "description": "None\n**IMPORTANT** Microsoft released update [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n## **Summary**\n\nLearn more about this security-only update, including improvements, any known issues, and how to get the update.\n\n**IMPORTANT** Windows 7, Windows Server 2008 R2, Windows Embedded Standard 7, and Windows Embedded POS Ready 7 have reached the end of mainstream support and are now in extended security update (ESU) support. Windows Thin PC has reached the end of mainstream support; however, ESU support is not available. Starting in July 2020, there will no longer be optional, non-security releases (known as \"C\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).Verify that** **you have installed the required updates in the **How to get this update** section before installing this update. Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of this OS must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ended on January 14, 2020. For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>). Because ESU is available as a separate SKU for each of the years in which they are offered (2020, 2021, and 2022)\u2014and because ESU can only be purchased in [specific 12-month periods](<https://docs.microsoft.com/lifecycle/faq/extended-security-updates>)\u2014you must purchase the third year of ESU coverage separately and activate a new key on each applicable device for your devices to continue receiving security updates in 2022.If your organization did not purchase the third year of ESU coverage, you must purchase Year 1, Year 2, and Year 3 ESU for your applicable Windows 7 SP1 or Windows Server 2008 R2 SP1 devices before you install and activate the Year 3 MAK keys to receive updates. The steps to [install, activate, and deploy ESUs](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) are the same for first, second, and third year coverage. For more information, see [Obtaining Extended Security Updates for eligible Windows devices](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) for the Volume Licensing process and [Purchasing Windows 7 ESUs as a Cloud Solution Provider](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/purchasing-windows-7-esus-as-a-cloud-solution-provider/ba-p/1034637>) for the CSP process. For embedded devices, contact your original equipment manufacturer (OEM).For more information, see the [ESU blog](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-extended-security-updates-for-windows-7-and-windows/ba-p/1872910>).\n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages for Windows 7 SP1 and Windows Server 2008 R2 SP1, see the following update history [home page](<https://support.microsoft.com/help/4009469>).\n\n## **Improvements**\n\nThis security-only update includes new improvements for the following issue:\n\n * Addresses an issue in which Speech and Network troubleshooters will not start.\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptom**| **Next step** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \u201cFailure to configure Windows updates. Reverting Changes. Do not turn off your computer,\u201d and the update might show as **Failed **in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\n * If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) post. For information on the prerequisites, see the **How to get this update** section of this article. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n\u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.| This issue is resolved in [update KB5018479](<https://support.microsoft.com/help/5018479>). \n \n## **How to get this update**\n\n**Before installing this update****IMPORTANT** Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of these operating systems must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates. Extended support ended as follows:\n\n * For Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1, extended support ended on January 14, 2020.\n * For Windows Embedded Standard 7, extended support ended on October 13, 2020.\n * For Windows Embedded POS Ready 7, extended support ended on October 12, 2021.\n * For Windows Thin PC, extended support ended on October 12, 2021. Note that ESU support is not available for Windows Thin PC.\nFor more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Note** For Windows Embedded Standard 7, Windows Management Instrumentation (WMI) must be enabled to get updates from Windows Update or Windows Server Update Services.**Prerequisite:**You must install the updates listed below and **restart your device** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The March 12, 2019 servicing stack update (SSU) ([KB4490628](<https://support.microsoft.com/help/4490628>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released September 10, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. To get this security update, you must reinstall the \"Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4538483](<https://support.microsoft.com/help/4538483>)) or the \"Update for the Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4575903](<https://support.microsoft.com/help/4575903>)) even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter installing the items above, Microsoft strongly recommends that you install the latest SSU ([KB5016057](<https://support.microsoft.com/help/5016057>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).\n\n**REMINDER** If you are using Security-only updates, you will also need to install all previous Security-only updates and the latest cumulative update for Internet Explorer ([KB5016618](<https://support.microsoft.com/help/5016618>)).\n\n**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| No| See the other options below. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016679>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1, Windows Embedded Standard 7 Service Pack 1, Windows Embedded POSReady 7**Classification**: Security Updates \n \n## **File information**\n\nFor a list of the files that are provided in this update, download the [file information for update KB5016679](<https://download.microsoft.com/download/0/7/5/075d3aa5-2a06-4feb-85ee-2b2c583d75a9/5016679.csv>).\n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-10-11T07:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016679 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {}, "cvelist": ["CVE-2022-34689"], "modified": "2022-10-11T07:00:00", "id": "KB5016679", "href": "https://support.microsoft.com/en-us/help/5016679", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T10:54:13", "description": "None\n## **Summary**\n\nLearn more about this security-only update, including improvements, any known issues, and how to get the update. \n\n**IMPORTANT **Windows Server 2008 Service Pack 2 (SP2) has reached the end of mainstream support and are now in extended support. Starting in July 2020, there will no longer be optional, non-security releases (known as \"C\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).Verify that** **you have installed the required updates in the **How to get this update** section before installing this update. Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of this OS must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ended on January 14, 2020. For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>). Because ESU is available as a separate SKU for each of the years in which they are offered (2020, 2021, and 2022)\u2014and because ESU can only be purchased in [specific 12-month periods](<https://docs.microsoft.com/lifecycle/faq/extended-security-updates>)\u2014you must purchase the third year of ESU coverage separately and activate a new key on each applicable device for your devices to continue receiving security updates in 2022.If your organization did not purchase the third year of ESU coverage, you must purchase Year 1, Year 2, and Year 3 ESU for your applicable Windows Server 2008 SP2 devices before you install and activate the Year 3 MAK keys to receive updates. The steps to [install, activate, and deploy ESUs](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) are the same for first, second, and third year coverage. For more information, see [Obtaining Extended Security Updates for eligible Windows devices](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) for the Volume Licensing process and [Purchasing Windows 7 ESUs as a Cloud Solution Provider](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/purchasing-windows-7-esus-as-a-cloud-solution-provider/ba-p/1034637>) for the CSP process. For embedded devices, contact your original equipment manufacturer (OEM).For more information, see the [ESU blog](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-extended-security-updates-for-windows-7-and-windows/ba-p/1872910>).\n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages for Windows Server 2008 SP2, see the following update history [home page](<https://support.microsoft.com/help/4343218>).\n\n## **Improvements**\n\nThis security-only update includes new improvements for the following issue:\n\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptom**| **Next step** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \u201cFailure to configure Windows updates. Reverting Changes. Do not turn off your computer\u201d, and the update might show as **Failed** in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\nIf you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://aka.ms/Windows7ESU>) post. For information on the prerequisites, see the \"How to get this update\" section of this article. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is resolved in [update KB5018446](<https://support.microsoft.com/help/5018446>). \n \n## **How to get this update**\n\n**Before installing this update****IMPORTANT** Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of this OS must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates because extended support ended on January 14, 2020.For more information on ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Prerequisite:**You must install the updates listed below and **restart your device** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The April 9, 2019 servicing stack update (SSU) ([KB4493730](<https://support.microsoft.com/help/4493730>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released October 8, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. The Extended Security Updates (ESU) Licensing Preparation Package ([KB4538484](<https://support.microsoft.com/help/4538484>)) or the Update for the Extended Security Updates (ESU) Licensing Preparation Package ([KB4575904](<https://support.microsoft.com/help/4575904>)). The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter installing the items above, we strongly recommend that you install the latest SSU ([KB5016129](<https://support.microsoft.com/help/5016129>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).\n\n**REMINDER** If you are using Security-only updates, you will also need to install all previous Security-only updates and the latest cumulative update for Internet Explorer ([KB5011486](<https://support.microsoft.com/help/5011486>)).\n\n**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| No| See the other options below. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016686>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2008 Service Pack 2**Classification**: Security Updates \n \n## **File information**\n\nFor a list of the files that are provided in this update, download the [file information for update KB5016686](<https://download.microsoft.com/download/0/6/c/06c0ed9d-28bc-4650-9d3d-4465dd243573/5016686.csv>).\n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-10-11T07:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016686 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {}, "cvelist": ["CVE-2022-34689"], "modified": "2022-10-11T07:00:00", "id": "KB5016686", "href": "https://support.microsoft.com/en-us/help/5016686", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T10:54:11", "description": "None\n**NEW 8/26/22****IMPORTANT **Microsoft released [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\nFor information about Windows update terminology, see the article about the [types of Windows updates](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) and the [monthly quality update types](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-quality-updates-primer/ba-p/2569385>). For an overview of Windows 11 (original release), see its update history page.**Note **Follow [@WindowsUpdate](<https://twitter.com/windowsupdate>) to find out when new content is published to the Windows release health dashboard. \n\n\n\n## Highlights \n\n * Addresses a known issue that might prevent some of you from opening the Start menu.\n * Addresses security issues for your Windows operating system. \n\n## Improvements\n\nThis security update includes improvements that were a part of update KB5015882 (released July 21, 2022) and also addresses the following issues: \n\n * Addresses a known issue that might prevent some of you from opening the Start menu. On the affected devices, clicking or tapping the Start button or using the Windows keyboard shortcut might have no effect.\nIf you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device.For more information about security vulnerabilities, please refer to the [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n### Windows 11 servicing stack update - 22000.826\n\nThis update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.\n\n## Known issues in this update\n\n**Applies to**| **Symptom**| **Workaround** \n---|---|--- \nIT admins| After installing this update, IE mode tabs in Microsoft Edge might stop responding when a site displays a modal dialog box. A modal dialog box is a form or dialog box that requires the user to respond before continuing or interacting with other portions of the webpage or app. **Developer Note** Sites affected by this issue call **window.focus**.| This issue is addressed in KB5016691. If you do not want to install this update, see the instructions below.This issue is resolved using [Known Issue Rollback (KIR)](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/known-issue-rollback-helping-you-keep-windows-devices-protected/ba-p/2176831>). Please note that it might take up to 24 hours for the resolution to propagate automatically to consumer devices and non-managed business devices. Restarting your Windows device might help the resolution apply to your device faster. For enterprise-managed devices that have installed an affected update and encountered this issue can resolve it by installing and configuring the special Group Policy listed below. For information on deploying and configuring these special Group Policy, please see [How to use Group Policy to deploy a Known Issue Rollback](<https://docs.microsoft.com/troubleshoot/windows-client/group-policy/use-group-policy-to-deploy-known-issue-rollback>).Group Policy downloads with Group Policy name:\n\n * [Download for Windows 11](<https://download.microsoft.com/download/5/e/3/5e356255-fd5f-47b4-b10d-267cbfc24e63/Windows%2011%20\\(original%20release\\)%20KB5014019%20220624_22553%20Known%20Issue%20Rollback.msi>) \\- Windows 11 (original release) KB5014019 220624_22553 Known Issue Rollback\n**Important** You will need to **install **and **configure** the Group Policy for your version of Windows to resolve this issue. \nIT admins| After installing this update, XPS Viewer might be unable to open XML Paper Specification (XPS) documents in some non-English languages, including some Japanese and Chinese character encodings. This issue affects both XML Paper Specification (XPS) and Open XML Paper Specification (OXPS) files. When encountering this issue, you may receive an error, \"This page cannot be displayed\" within XPS Viewer or it might stop responding and have high CPU usage with continually increasing memory usage. When the error is encountered, if XPS Viewer is not closed it might reach up to 2.5GB of memory usage before closing unexpectedly.This issue does not affect most home users. The [XPS Viewer is no longer installed by default as of Windows 10, version 1803](<https://docs.microsoft.com/windows/deployment/planning/windows-10-removed-features>) and [must be manually installed](<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fapplication-management%2Fadd-apps-and-features&data=05%7C01%7Cv-shros%40microsoft.com%7Cf67e41cad4af4dcf09ac08da79a42805%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637956043196783103%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=mAxvq%2BP02NuUNLL2Heb2Ukgr1KQwfN5Gs0xwQBs5egY%3D&reserved=0>).| This issue is addressed in KB5017383. \nAll users| Starting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is addressed in KB5017383. \n \n## How to get this update\n\n**Before installing this update**Microsoft combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/topic/servicing-stack-updates-ssu-frequently-asked-questions-06b62771-1cb0-368c-09cf-87c4efc4f2fe>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nWindows Update for Business| Yes| None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016629>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 11**Classification**: Security Updates \n \n**If you want to remove the LCU**To remove the LCU after installing the combined SSU and LCU package, use the [DISM/Remove-Package](<https://docs.microsoft.com/windows-hardware/manufacture/desktop/dism-operating-system-package-servicing-command-line-options>) command line option with the LCU package name as the argument. You can find the package name by using this command: **DISM /online /get-packages**.Running [Windows Update Standalone Installer](<https://support.microsoft.com/topic/description-of-the-windows-update-standalone-installer-in-windows-799ba3df-ec7e-b05e-ee13-1cdae8f23b19>) (**wusa.exe**) with the **/uninstall **switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.\n\n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 5016629](<https://download.microsoft.com/download/9/0/4/904f3b7d-8fdb-4582-9421-0b75c1fd1dba/5016629.csv>). For a list of the files that are provided in the servicing stack update, download the [file information for the SSU - version 22000.826](<https://download.microsoft.com/download/5/d/6/5d6bad3d-8606-435d-914a-6d4f78f8bd0c/SSU_version_22000_826.csv>). \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-10-11T07:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016629 (OS Build 22000.856)", "bulletinFamily": "microsoft", "cvss2": {}, "cvelist": ["CVE-2022-34689"], "modified": "2022-10-11T07:00:00", "id": "KB5016629", "href": "https://support.microsoft.com/en-us/help/5016629", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T10:54:11", "description": "None\n**NEW 8/26/22****IMPORTANT **Microsoft released [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n**12/8/20** \nFor information about Windows update terminology, see the article about the [types of Windows updates](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) and the [monthly quality update types](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-quality-updates-primer/ba-p/2569385>). For an overview of Windows 10, version 1507, see its update history page. \n\n## Highlights\n\n * Addresses an issue that prevents certain troubleshooting tools rom opening.\n * Addresses security issues for your Windows operating system. \n\n## Improvements \n\nThis security update includes quality improvements. Key changes include: \n\n * Addresses an issue that prevents certain troubleshooting tools from opening.\nIf you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device.For more information about security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website and the [August 2022 Security Updates.](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## Known issues in this update\n\n**Symptoms**| **Workaround** \n---|--- \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| To mitigate this issue, please see [Possible issues caused by new Daylight Savings Time in Chile](<https://docs.microsoft.com/windows/release-health/status-windows-10-1507#2892msgdesc>).We are working on a resolution and will provide an update in an upcoming release.**Note **We plan to release an update to support this change; however, there might be insufficient time to properly build, test, and release such an update before the change goes into effect. Please use the workaround above. \n \n## How to get this update\n\n**Before installing this update**Microsoft strongly recommends you install the latest servicing stack update (SSU) for your operating system before installing the latest cumulative update (LCU). SSUs improve the reliability of the update process to mitigate potential issues while installing the LCU and applying Microsoft security updates. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/topic/servicing-stack-updates-ssu-frequently-asked-questions-06b62771-1cb0-368c-09cf-87c4efc4f2fe>). If you are using Windows Update, the latest SSU (KB5014024) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nWindows Update for Business| Yes| None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016639>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 10**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 5016639](<https://download.microsoft.com/download/b/3/2/b3207cff-8f47-4014-a438-0126cd8adc99/5016639.csv>). \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-10-11T07:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016639 (OS Build 10240.19387)", "bulletinFamily": "microsoft", "cvss2": {}, "cvelist": ["CVE-2022-34689"], "modified": "2022-10-11T07:00:00", "id": "KB5016639", "href": "https://support.microsoft.com/en-us/help/5016639", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T10:54:12", "description": "None\n**IMPORTANT** Microsoft released update [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n## **Summary**\n\nLearn more about this cumulative security update, including improvements, any known issues, and how to get the update. \n\n**IMPORTANT **Windows 7, Windows Server 2008 R2, Windows Embedded Standard 7, and Windows Embedded POS Ready 7 have reached the end of mainstream support and are now in extended security update (ESU) support. Windows Thin PC has reached the end of mainstream support; however, ESU support is not available. Starting in July 2020, there will no longer be optional, non-security releases (known as \"C\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).Verify that** **you have installed the required updates in the **How to get this update** section before installing this update. Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of this OS must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ended on January 14, 2020. For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>). Because ESU is available as a separate SKU for each of the years in which they are offered (2020, 2021, and 2022)\u2014and because ESU can only be purchased in [specific 12-month periods](<https://docs.microsoft.com/lifecycle/faq/extended-security-updates>)\u2014you must purchase the third year of ESU coverage separately and activate a new key on each applicable device for your devices to continue receiving security updates in 2022.If your organization did not purchase the third year of ESU coverage, you must purchase Year 1, Year 2, and Year 3 ESU for your applicable Windows 7 SP1 or Windows Server 2008 R2 SP1 devices before you install and activate the Year 3 MAK keys to receive updates. The steps to [install, activate, and deploy ESUs](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) are the same for first, second, and third year coverage. For more information, see [Obtaining Extended Security Updates for eligible Windows devices](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) for the Volume Licensing process and [Purchasing Windows 7 ESUs as a Cloud Solution Provider](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/purchasing-windows-7-esus-as-a-cloud-solution-provider/ba-p/1034637>) for the CSP process. For embedded devices, contact your original equipment manufacturer (OEM).For more information, see the [ESU blog](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-extended-security-updates-for-windows-7-and-windows/ba-p/1872910>).\n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages for Windows 7 and Windows Server 2008 R2, see the following update history [home page](<https://support.microsoft.com/help/4009469>).\n\n## **Improvements**\n\nThis cumulative security update contains improvements that are part of update [KB5015861](<https://support.microsoft.com/help/5015861>) (released July 12, 2022) and includes new improvements for the following issues:\n\n * Addresses an issue in which Speech and Network troubleshooters will not start.\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptom **| **Next step ** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \"Failure to configure Windows updates. Reverting Changes. Do not turn off your computer\", and the update might show as **Failed** in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\nIf you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) post. For information on the prerequisites, see the **How to get this update** section of this article. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n\u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.| This issue is resolved in [update KB5018454](<https://support.microsoft.com/help/5018454>). \n \n## **How to get this update**\n\n**Before installing this update****IMPORTANT** Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of these operating systems must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates. Extended support ended as follows:\n\n * For Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1, extended support ended on January 14, 2020.\n * For Windows Embedded Standard 7, extended support ended on October 13, 2020.\n * For Windows Embedded POS Ready 7, extended support ended on October 12, 2021.\n * For Windows Thin PC, extended support ended on October 12, 2021. Note that ESU support is not available for Windows Thin PC.\nFor more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Note** For Windows Embedded Standard 7, Windows Management Instrumentation (WMI) must be enabled to get updates from Windows Update or Windows Server Update Services.**Prerequisite**You must install the updates listed below and **restart your device** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The March 12, 2019 servicing stack update (SSU) ([KB4490628](<https://support.microsoft.com/help/4490628>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released September 10, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. To get this security update, you must reinstall the \"Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4538483](<https://support.microsoft.com/help/4538483>)) or the \"Update for the Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4575903](<https://support.microsoft.com/help/4575903>)) even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter you install the items above, we strongly recommend that you install the latest SSU ([KB5016057](<https://support.microsoft.com/help/5016057>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update if you are an ESU customer. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016676>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1, Windows Embedded Standard 7 Service Pack 1, Windows Embedded POSReady 7**Classification**: Security Updates \n \n## **File information**\n\nFor a list of the files that are provided in this update, download the [file information for update KB5016676](<https://download.microsoft.com/download/7/5/d/75d1aed6-b246-418e-9f56-efc953ea7e70/5016676.csv>).\n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-10-11T07:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016676 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {}, "cvelist": ["CVE-2022-34689"], "modified": "2022-10-11T07:00:00", "id": "KB5016676", "href": "https://support.microsoft.com/en-us/help/5016676", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T10:54:11", "description": "None\n**IMPORTANT** Microsoft released update [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n## **Summary**\n\nLearn more about this cumulative security update, including improvements, any known issues, and how to get the update. \n\n**IMPORTANT** Windows Server 2012 has reached the end of mainstream support and is now in extended support. Starting in July 2020, there will no longer be optional releases (known as \"C\" or \"D\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).Verify that** **you have installed the required updates listed in the **How to get this update** section before installing this update. \n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows Server 2012 update history [home page](<https://support.microsoft.com/help/4009471>).\n\n## **Improvements**\n\nThis cumulative security update contains improvements that are part of update [KB5015863](<https://support.microsoft.com/help/5015863>) (released July 12, 2022) and includes new improvements for the following issues:\n\n * Addresses an issue in which Speech and Network troubleshooters will not start.\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptoms**| **Next step** \n---|--- \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is resolved in [update KB5018457](<https://support.microsoft.com/help/5018457>). \n \n## **How to get this update**\n\n**Before installing this update**We strongly recommend that you install the latest servicing stack update (SSU) for your operating system before installing the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).If you use Windows Update, the latest SSU ([KB5016263](<https://support.microsoft.com/help/5016263>)) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). **Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016672>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2012, Windows Embedded 8 Standard**Classification**: Security Updates \n \n## **File information**\n\nFor a list of the files that are provided in this update, download the [file information for update KB5016672](<https://download.microsoft.com/download/b/7/5/b75ea0f1-b444-4851-9385-e368b0b79d66/5016672.csv>).\n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-10-11T07:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016672 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {}, "cvelist": ["CVE-2022-34689"], "modified": "2022-10-11T07:00:00", "id": "KB5016672", "href": "https://support.microsoft.com/en-us/help/5016672", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T10:54:10", "description": "None\n**NEW 8/26/22****IMPORTANT **Microsoft released [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n**UPDATED 8/9/22** \n**IMPORTANT **Windows Server, version 20H2 is at end of service today, August 9, 2022. After August 9, 2022, these devices will no longer receive monthly security and quality updates that contain protection from the latest security threats. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows Server. We will continue to service the following editions: Windows 10 Enterprise and Education, Windows 10 IoT Enterprise, Windows 10 Enterprise multi-session, and Windows 10 on Surface Hub. \n\n**5/10/22** \n**REMINDER **To update to one of the newer versions of Windows 10, we recommend that you use the appropriate Enablement Package KB (EKB). Using the EKB makes updating faster and easier and requires a single restart. To find the EKB for a specific OS, go to the **Improvements** section and click or tap the OS name to expand the collapsible section. \n\n**11/17/20**For information about Windows update terminology, see the article about the [types of Windows updates](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) and the [monthly quality update types](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-quality-updates-primer/ba-p/2569385>). For an overview of Windows 10, version 20H2, see its update history page. **Note **Follow [@WindowsUpdate](<https://twitter.com/windowsupdate>) to find out when new content is published to the Windows release health dashboard.\n\n## Highlights\n\n * Addresses an issue that affects the printing of files you submit to a printer.\n * Addresses a known issue that might prevent the Input Indicator and Language Bar from displaying in the notification area. This issue affects devices that have more than one language installed.\n * Addresses a known issue that might cause printing operations to fail. It might also create printer duplicates on a device. The duplicate printer\u2019s name usually has the suffix \"Copy1\". Applications that refer to the printer by a specific name cannot print.\n\n## Improvements \n\n**Note **To view the list of addressed issues, click or tap the OS name to expand the collapsible section.\n\n### \n\n__\n\nWindows 10, version 21H2\n\n**Important: **Use EKB KB5003791 to update to Windows 10, version 21H2.\n\nThis security update includes quality improvements. Key changes include: \n\n * This build includes all the improvements from Windows 10, version 20H2.\n * No additional issues were documented for this release. \n\n### \n\n__\n\nWindows 10, version 21H1\n\n**Important: **Use EKB KB5000736 to update to Windows 10, version 21H1.\n\nThis security update includes quality improvements. Key changes include: \n\n * This build includes all the improvements from Windows 10, version 20H2.\n * No additional issues were documented for this release.\n\n### \n\n__\n\nWindows Server, version 20H2\n\n**Important: **Use EKB KB4562830 to update to Windows Server, version 20H2.\n\nThis security update includes improvements that were a part of update KB5015878 (released July 26, 2022) and also addresses the following issues: \n\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Addresses an issue that creates a duplicate print queue. This causes the original print queue to lose functionality.\n * Addresses a known issue that might prevent the Input Indicator and Language Bar from displaying in the notification area. This issue affects devices that have more than one language installed.\n * Addresses a known issue that might cause printing operations to fail. It might also create printer duplicates on a device. The duplicate printer\u2019s name usually has the suffix \"Copy1\". Applications that refer to the printer by a specific name cannot print.\nIf you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device. For more information about security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>). \n\n### Windows 10 servicing stack update - 19042.1852, 19043.1852, and 19044.1852\n\nThis update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.\n\n## Known issues in this update\n\n### \n\n__\n\nClick or tap to view the known issues\n\n**Symptom**| **Workaround** \n---|--- \nDevices with Windows installations created from custom offline media or custom ISO image might have [Microsoft Edge Legacy](<https://support.microsoft.com/microsoft-edge/what-is-microsoft-edge-legacy-3e779e55-4c55-08e6-ecc8-2333768c0fb0>) removed by this update, but not automatically replaced by the new Microsoft Edge. This issue is only encountered when custom offline media or ISO images are created by slipstreaming this update into the image without having first installed the standalone servicing stack update (SSU) released March 29, 2021 or later.**Note **Devices that connect directly to Windows Update to receive updates are not affected. This includes devices using Windows Update for Business. Any device connecting to Windows Update should always receive the latest versions of the SSU and latest cumulative update (LCU) without any extra steps. | To avoid this issue, be sure to first slipstream the SSU released March 29, 2021 or later into the custom offline media or ISO image before slipstreaming the LCU. To do this with the combined SSU and LCU packages now used for Windows 10, version 20H2 and Windows 10, version 2004, you will need to extract the SSU from the combined package. Use the following steps to extract the SSU:\n\n 1. Extract the cab from the msu via this command line (using the package for KB5000842 as an example): **expand Windows10.0-KB5000842-x64.msu /f:Windows10.0-KB5000842-x64.cab <destination path>**\n 2. Extract the SSU from the previously extracted cab via this command line: **expand Windows10.0-KB5000842-x64.cab /f:* <destination path>**\n 3. You will then have the SSU cab, in this example named **SSU-19041.903-x64.cab**. Slipstream this file into your offline image first, then the LCU.\nIf you have already encountered this issue by installing the OS using affected custom media, you can mitigate it by directly installing the [new Microsoft Edge](<https://www.microsoft.com/edge>). If you need to broadly deploy the new Microsoft Edge for business, see [Download and deploy Microsoft Edge for business](<https://www.microsoft.com/edge/business/download>). \n| \nAfter installing this update, IE mode tabs in Microsoft Edge might stop responding when a site displays a modal dialog box. A modal dialog box is a form or dialog box that requires the user to respond before continuing or interacting with other portions of the webpage or app. **Developer Note** Sites affected by this issue call **window.focus**.| This issue is addressed in KB5016688. If you do not want to install this release, see the instructions below.This issue is resolved using [Known Issue Rollback (KIR)](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/known-issue-rollback-helping-you-keep-windows-devices-protected/ba-p/2176831>). Please note that it might take up to 24 hours for the resolution to propagate automatically to consumer devices and non-managed business devices. Restarting your Windows device might help the resolution apply to your device faster. For enterprise-managed devices that have installed an affected update and encountered this issue can resolve it by installing and configuring the special Group Policy listed below. For information on deploying and configuring these special Group Policy, please see [How to use Group Policy to deploy a Known Issue Rollback](<https://docs.microsoft.com/troubleshoot/windows-client/group-policy/use-group-policy-to-deploy-known-issue-rollback>). Group Policy download with Group Policy name: \n\n * [Download for Windows 10, version 20H2 and Windows 10, version 21H1 - ](<https://download.microsoft.com/download/8/8/0/88004bea-c83b-4d0c-9ac9-1996644578e9/Windows%2010%2020H2,%2021H1%20and%2021H2%20KB5014023%20220624_22551%20Known%20Issue%20Rollback.msi>)Windows 10 20H2, 21H1 and 21H2 KB5014023 220624_22551 Known Issue Rollback\n**Important** You will need to **install **and **configure** the Group Policy for your version of Windows to resolve this issue. \n| \nAfter installing this update, XPS Viewer might be unable to open XML Paper Specification (XPS) documents in some non-English languages, including some Japanese and Chinese character encodings. This issue affects both XML Paper Specification (XPS) and Open XML Paper Specification (OXPS) files. When encountering this issue, you may receive an error, \"This page cannot be displayed\" within XPS Viewer or it might stop responding and have high CPU usage with continually increasing memory usage. When the error is encountered, if XPS Viewer is not closed it might reach up to 2.5GB of memory usage before closing unexpectedly.This issue does not affect most home users. The [XPS Viewer is no longer installed by default as of Windows 10, version 1803](<https://docs.microsoft.com/windows/deployment/planning/windows-10-removed-features>) and [must be manually installed](<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fapplication-management%2Fadd-apps-and-features&data=05%7C01%7Cv-shros%40microsoft.com%7Cf67e41cad4af4dcf09ac08da79a42805%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637956043196783103%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=mAxvq%2BP02NuUNLL2Heb2Ukgr1KQwfN5Gs0xwQBs5egY%3D&reserved=0>).| This issue is addressed in KB5017380. \nAfter installing this update, some Windows devices might have issues with audio not working. Some affected Windows devices might have no audio, but other affected Windows devices might only have issues on certain ports, certain audio devices or only within certain applications. Most affected audio devices drivers have the \"audio enhancements\" setting disabled before installing this update or the sound device driver has issues with the \"audio enhancements\" feature.| This issue can be mitigated differently depending on your symptoms and if you have installed the update already. Please see the known issue on [Windows release health](<https://docs.microsoft.com/windows/release-health/resolved-issues-windows-10-21h2#2887msgdesc>) for instructions to prevent and mitigate this issue.This issue is addressed using a [Known Issue Rollback (KIR)](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/known-issue-rollback-helping-you-keep-windows-devices-protected/ba-p/2176831>). This KIR will prevent the issue on Windows devices that have not installed KB5015878, but will have no effect on devices already affected by this known issue. Please note that it might take up to 24 hours for the KIR to propagate automatically to consumer devices and non-managed business devices. Restarting your Windows device might help the KIR apply to your device faster. For enterprise-managed devices that have installed an affected update and encountered this issue, you can address it by installing and configuring a special Group Policy. The special Group Policy can be found in **Computer Configuration** > **Administrative Templates**> **<Group Policy name listed below>**. For information about deploying and configuring these special Group Policy, see [How to use Group Policy to deploy a Known Issue Rollback](<https://docs.microsoft.com/troubleshoot/windows-client/group-policy/use-group-policy-to-deploy-known-issue-rollback>).Group Policy downloads with Group Policy name:\n\n * [Download for Windows 10, version 21H2, Windows 10, version 21H2, Windows 10, version 20H2](<https://download.microsoft.com/download/f/f/c/ffc21663-8f01-489a-8797-5fe6def240d7/Windows%2010%2020H2,%2021H1%20and%2021H2%20KB5015878%20220706_045043%20Known%20Issue%20Rollback.msi>) \\- **KB5015878 220706_045043 Known Issue Rollback**\n**Important** You must **install **and **configure** the Group Policy for your version of Windows to resolve this issue. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is addressed in KB5017380. \n \n## How to get this update\n\n**Before installing this update**Microsoft now combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/topic/servicing-stack-updates-ssu-frequently-asked-questions-06b62771-1cb0-368c-09cf-87c4efc4f2fe>).Prerequisite:Based on your installation scenario, choose one of the following:\n\n 1. For offline OS image servicing:If your image does not have the March 22, 2022 (KB5011543) or later LCU, you **must **install the special standalone May 10, 2022 SSU (KB5014032) before installing this update.\n 2. For Windows Server Update Services (WSUS) deployment or when installing the standalone package from Microsoft Update Catalog: If your devices do not have the May 11, 2021 (KB5003173) or later LCU, you **must **install the special standalone August 10, 2021 SSU (KB5005260) before installing this update.\n**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nWindows Update for Business| Yes| None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016616>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 10, version 1903 and later**Classification**: Security Updates \n \n**If you want to remove the LCU**To remove the LCU after installing the combined SSU and LCU package, use the [DISM/Remove-Package](<https://docs.microsoft.com/windows-hardware/manufacture/desktop/dism-operating-system-package-servicing-command-line-options>) command line option with the LCU package name as the argument. You can find the package name by using this command: **DISM /online /get-packages**.Running [Windows Update Standalone Installer](<https://support.microsoft.com/topic/description-of-the-windows-update-standalone-installer-in-windows-799ba3df-ec7e-b05e-ee13-1cdae8f23b19>) (**wusa.exe**) with the **/uninstall **switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.\n\n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 5016616](<https://download.microsoft.com/download/d/e/5/de54fe61-84b0-4edc-bb75-be908306ff9e/5016616.csv>). For a list of the files that are provided in the servicing stack update, download the [file information for the SSU - version 19042.1852, 19043.1852, and 19044.1852](<https://download.microsoft.com/download/1/9/2/1920eca0-61e9-4b3a-aa7b-4485627e54f1/SSU_version_19041_1852.csv>). \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-10-11T07:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016616 (OS Builds 19042.1889, 19043.1889, and 19044.1889)", "bulletinFamily": "microsoft", "cvss2": {}, "cvelist": ["CVE-2022-34689"], "modified": "2022-10-11T07:00:00", "id": "KB5016616", "href": "https://support.microsoft.com/en-us/help/5016616", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T10:54:11", "description": "None\n**NEW 8/26/22****IMPORTANT **Microsoft released [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\nFor information about Windows update terminology, see the article about the [types of Windows updates](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) and the [monthly quality update types](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-quality-updates-primer/ba-p/2569385>). For an overview of Windows Server 2022, see its update history page. **Note **Follow [@WindowsUpdate](<https://twitter.com/windowsupdate>) to find out when new content is published to the Windows release health dashboard. \n\n## Improvements\n\nThis security update includes improvements that were a part of update KB5015879 (released July 19, 2022) and also addresses the following issues: \n\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\nIf you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device.For more information about security vulnerabilities, please refer to the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>)\n\n### Windows 10 servicing stack update - 20348.850\n\nThis update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nAfter installing this update, IE mode tabs in Microsoft Edge might stop responding when a site displays a modal dialog box. A modal dialog box is a form or dialog box that requires the user to respond before continuing or interacting with other portions of the webpage or app. **Developer Note** Sites affected by this issue call **window.focus**.| This issue is addressed in KB5016693. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is addressed in KB5017381. \n \n## How to get this update\n\n**Before installing this update**Microsoft now combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/topic/servicing-stack-updates-ssu-frequently-asked-questions-06b62771-1cb0-368c-09cf-87c4efc4f2fe>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nWindows Update for Business| Yes| None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016627>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Microsoft Server operating system-21H2**Classification**: Security Updates \n \n**If you want to remove the LCU**To remove the LCU after installing the combined SSU and LCU package, use the [DISM/Remove-Package](<https://docs.microsoft.com/windows-hardware/manufacture/desktop/dism-operating-system-package-servicing-command-line-options>) command line option with the LCU package name as the argument. You can find the package name by using this command: **DISM /online /get-packages**.Running [Windows Update Standalone Installer](<https://support.microsoft.com/topic/description-of-the-windows-update-standalone-installer-in-windows-799ba3df-ec7e-b05e-ee13-1cdae8f23b19>) (**wusa.exe**) with the **/uninstall **switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.\n\n**File Information**For a list of the files that are provided in this update, download the [file information for cumulative update 5016627](<https://download.microsoft.com/download/c/9/0/c903a6e1-fbe7-4978-8482-9d4c9cd3b5cc/5016627.csv>). For a list of the files that are provided in the servicing stack update, download the [file information for the SSU - version 20348.850](<https://download.microsoft.com/download/9/9/1/9916b98e-3f4e-42ff-8be5-1647dbbe0037/SSU_version_20348_850.csv>). \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-10-11T07:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016627 (OS Build 20348.887)", "bulletinFamily": "microsoft", "cvss2": {}, "cvelist": ["CVE-2022-34689"], "modified": "2022-10-11T07:00:00", "id": "KB5016627", "href": "https://support.microsoft.com/en-us/help/5016627", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T10:54:13", "description": "None\n**IMPORTANT** Microsoft released update [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n## **Summary**\n\nLearn more about this security-only update, including improvements, any known issues, and how to get the update. \n\n**IMPORTANT **Windows Server 2012 has reached the end of mainstream support and is now in extended support. Starting in July 2020, there will no longer be optional releases (known as \"C\" or \"D\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).Verify that** **you have installed the required updates listed in the **How to get this update** section before installing this update. \n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows Server 2012 update history [home page](<https://support.microsoft.com/help/4009471>).\n\n## **Improvements**\n\nThis security-only update includes new improvements for the following issues:\n\n * Addresses an issue in which Speech and Network troubleshooters will not start.\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptoms**| **Next step** \n---|--- \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of