- Windscribe VPN review: A flexible and free VPN
- One of my favorite foldables brings the flip phone back in the best way (and it's $200 off)
- I opened up a cheap 600W charger to test its build, and found 'goo' inside
- How to negotiate like a pro: 4 secrets to success
- One of the cheapest Android tablets I've ever tested replaced my iPad with no sweat
Tripwire Patch Priority Index for June 2022 | The State of Security

Tripwire’s June 2022 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft.
First on the patch priority list this month is a patch for a remote code execution vulnerability in Edge.
Next are patches for Office and Excel that resolve 3 information disclosure vulnerabilities and 1 remote code execution vulnerability
Up next are patches that affect components of the Windows operating systems. These resolve over 25 vulnerabilities, including elevation of privilege, information disclosure, security feature bypass, remote code execution, and denial of service vulnerabilities. These vulnerabilities affect core Windows, Kernel, Media Center, Print Spooler, LSA, Network File System, Kerberos, and others.
Next are patches for the .NET and Visual Studio that resolve an information disclosure vulnerability.
Up next are patches that resolve information disclosure vulnerabilities in various Intel CPU families.
Lastly, administrators should focus on server-side patches for Hyper-V, LDAP, SharePoint, SQL Server, and Remote Volume Shadow Copy Service (RVSS). These resolve remote code execution and elevation of privilege vulnerabilities.
BULLETIN | CVE |
Microsoft Edge (Chromium-based) | CVE-2022-22021 |
Microsoft Office | CVE-2022-30172, CVE-2022-30171, CVE-2022-30159, CVE-2022-30174 |
Microsoft Office Excel | CVE-2022-30173 |
Microsoft Windows | CVE-2022-30131, CVE-2022-30135, CVE-2022-30147, CVE-2022-30136, CVE-2022-30148, CVE-2022-30140, CVE-2022-30167, CVE-2022-30193, CVE-2022-29119, CVE-2022-29111, CVE-2022-22018, CVE-2022-30188, CVE-2022-30151, CVE-2022-30155, CVE-2022-30162, CVE-2022-30152, CVE-2022-30150, CVE-2022-30166, CVE-2022-30142, CVE-2022-30189, CVE-2022-30164, CVE-2022-30165, CVE-2022-30145, CVE-2022-30132, CVE-2022-30160, CVE-2022-32230 |
.NET and Visual Studio | CVE-2022-30184 |
Intel | CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166 |
Role: Windows Hyper-V | CVE-2022-30163 |
Remote Volume Shadow Copy Service (RVSS) | CVE-2022-30154 |
Microsoft Office SharePoint | CVE-2022-30157, CVE-2022-30158 |
Windows LDAP – Lightweight Directory Access Protocol | CVE-2022-30149, CVE-2022-30141, CVE-2022-30143, CVE-2022-30161, CVE-2022-30146, CVE-2022-30139, CVE-2022-30153 |