- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- This $28 'magic arm' makes taking pictures so much easier (and it's only $20 for Black Friday)
- Two free ways to get a Perplexity Pro subscription for one year
- The 40+ best Black Friday PlayStation 5 deals 2024: Deals available now
- The 25+ best Black Friday Nintendo Switch deals 2024
Tripwire Patch Priority Index for August 2022 | The State of Security
Tripwire’s August 2022 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.
First on the patch priority list this month are patches for Microsoft Office, Outlook, and Excel that resolve 4 vulnerabilities, including denial of service, remote code execution, and security feature bypass.
Up next are patches that affect components of the Windows operating systems. These patches resolve over 55 vulnerabilities, including elevation of privilege, information disclosure, security feature bypass, remote code execution, and denial of service vulnerabilities. These vulnerabilities affect core Windows, Kernel, Secure Socket Tunneling Protocol, Windows Support Diagnostic Tools, Bluetooth Driver, point-to-point protocol, and others.
Next are patches for .NET Core and Visual Studio that resolve spoofing and remote code execution vulnerabilities.
Lastly, administrators should focus on server-side patches for Hyper-V, Active Directory Domain Services, IIS, System Center Operations Manager, and Exchange. These patches resolve remote code execution, elevation of privilege, Information Disclosure, Tampering, and Denial of Service vulnerabilities.
BULLETIN | CVE |
Microsoft Office Outlook | CVE-2022-35742 |
Microsoft Office | CVE-2022-34717 |
Microsoft Office Excel | CVE-2022-33648, CVE-2022-33631 |
Microsoft Windows | CVE-2022-30194, CVE-2022-34701, CVE-2022-35745, CVE-2022-35767, CVE-2022-35766, CVE-2022-35794, CVE-2022-34702, CVE-2022-34714, CVE-2022-35743, CVE-2022-34713, CVE-2022-35760, CVE-2022-35797, CVE-2022-35750, CVE-2022-35820, CVE-2022-35769, CVE-2022-35752, CVE-2022-35753, CVE-2022-34715, CVE-2022-35757, CVE-2022-35771, CVE-2022-34705, CVE-2022-34704, CVE-2022-34710, CVE-2022-34712, CVE-2022-34709, CVE-2022-35804, CVE-2022-35768, CVE-2022-35761, CVE-2022-34707, CVE-2022-34708, CVE-2022-30197, CVE-2022-35758, CVE-2022-35747, CVE-2022-35744, CVE-2022-30133, CVE-2022-33670, CVE-2022-34703, CVE-2022-35759, CVE-2022-34706, CVE-2022-35763, CVE-2022-35762, CVE-2022-35765, CVE-2022-35764, CVE-2022-35792, CVE-2022-34699, CVE-2022-35756, CVE-2022-30144, CVE-2022-35755, CVE-2022-35793, CVE-2022-35795, CVE-2022-34690, CVE-2022-34301, CVE-2022-34302, CVE-2022-34303, CVE-2022-35746, CVE-2022-35749, CVE-2022-35754 |
Visual Studio | CVE-2022-35825, CVE-2022-35826, CVE-2022-35777, CVE-2022-35827 |
.NET Core | CVE-2022-34716 |
IIS | CVE-2022-35748 |
System Center Operations Manager | CVE-2022-33640 |
Active Directory Domain Services | CVE-2022-34691 |
Windows Hyper-V | CVE-2022-35751, CVE-2022-34696 |
Microsoft Exchange Server | CVE-2022-34692, CVE-2022-21979, CVE-2022-30134, CVE-2022-24477, CVE-2022-24516, CVE-2022-21980 |