vulnerability
Microsoft CVE-2022-41064: .NET Framework Information Disclosure Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:A/AC:M/Au:S/C:C/I:N/A:N) | Nov 8, 2022 | Nov 8, 2022 | Jan 28, 2025 |
Severity
5
CVSS
(AV:A/AC:M/Au:S/C:C/I:N/A:N)
Published
Nov 8, 2022
Added
Nov 8, 2022
Modified
Jan 28, 2025
Description
Microsoft CVE-2022-41064: .NET Framework Information Disclosure Vulnerability
Solutions
msft-kb5019970-5e99807d-3b5e-4eaa-8c27-b31229293f64msft-kb5019970-6a62bf32-f4f8-47ca-8cd9-5cfedb286b28msft-kb5020609-052e0959-58fa-443d-8422-0b2e6a7250d8msft-kb5020609-5b54e12c-87c8-4e8e-b95e-c93d10bcf04cmsft-kb5020609-d4d490ee-99a6-482d-b50c-537458d84815msft-kb5020609-eab471a9-eecb-4634-bcc1-cd1710a85f06msft-kb5020609-fce8cc63-ae23-4f60-a4da-85a822039a69msft-kb5020610-02f1d5a8-7c6e-4a6c-a218-73d386a09982msft-kb5020610-5b610e9c-977a-4070-9897-a0d1a289e061msft-kb5020610-e8b6dac5-f90e-45fe-849d-dd460234e091msft-kb5020611-28049461-ff62-4885-80de-0f3818ab57aemsft-kb5020611-2d1c469d-8ab5-4c26-b47c-db4a38c16019msft-kb5020611-3c41c71c-ee26-43e5-8a90-1e58f329b7d2msft-kb5020612-08cacffa-abfe-4e65-82b4-4ba2a51ee15dmsft-kb5020612-2d3de563-c942-473d-87c9-7901f17a5b88msft-kb5020612-873d651f-560e-46af-abb6-6565bcc2a2f4msft-kb5020612-97665d0a-3d8c-42f0-8f24-84f44be27e9dmsft-kb5020612-acea7b7e-2cde-495c-8a89-4fd7865e7bc8msft-kb5020612-cbd36c8c-520f-4f35-8606-496234a31818msft-kb5020612-ccf3a2c4-e409-4f01-8da3-e23b43c1f0femsft-kb5020613-24cc39f3-1cdb-4da4-9400-b5b94543cd1bmsft-kb5020613-46a862ff-58c1-4663-b04f-1de54c3b5ee0msft-kb5020613-6fff39ae-ccca-471d-b11f-7d7ead03dc45msft-kb5020613-7177c782-3102-4a3a-abd7-b9667cc8ecbfmsft-kb5020613-a05ca9cb-96ad-4ad1-a7c9-15a6196334f2msft-kb5020613-a50db476-5bdb-44c4-b844-8510be622bdcmsft-kb5020613-afef26e1-0488-4365-81a2-cec7d40ee0f8msft-kb5020613-c5488199-e366-48bb-97e4-a5e44b3c1aa8msft-kb5020614-357b6552-69cc-45a5-a693-16211ea3b799msft-kb5020614-d973c80c-8187-4583-bd59-3cae8826e0e1msft-kb5020614-dacf45d6-e1e8-4cd4-983d-9d66696c4f54msft-kb5020615-45323a72-c317-4829-9e78-e0d29d8ccb33msft-kb5020615-dcc5f03d-4bb3-47b9-83a7-e69a7c15ecbbmsft-kb5020615-f6a45aca-2111-42a9-99f6-785b04bd19aamsft-kb5020617-b862be75-080e-49d9-ba23-6b3ba7851bbfmsft-kb5020618-1f673f6d-f851-4a28-9164-de5bd298ee72msft-kb5020618-c9e5975e-7ceb-4155-9da1-4c69bdf6bd52msft-kb5020618-f103eca6-5d6d-4b63-b528-b46ee430f5famsft-kb5020619-1e120f67-f1a1-428a-8269-faf27f690536msft-kb5020619-d8d26f14-67a8-449d-a99d-e7b2e34f04e8msft-kb5020620-dc5dd9fb-9957-4d37-8c07-9752a2b120femsft-kb5020620-df02f06e-7b3f-40e8-a303-ea0fcf90f61amsft-kb5020620-fae14023-3404-4d81-87a9-931205cec059msft-kb5020622-39d86537-06f8-4ca2-bca0-98fcbfccdf73msft-kb5020623-21ad0c12-edca-403d-8240-60611ff02104msft-kb5020623-3135461d-2247-460c-9a13-ea5a6a87a464msft-kb5020623-735acb66-87c3-4914-82e3-a77dba7435a6msft-kb5020623-7fce21c4-bfd5-4af6-95ef-4b28e93faf63msft-kb5020623-96f7a8c9-da28-427a-9cb5-2fc4169d37f1msft-kb5020623-a9c0614c-0758-4154-bb68-82e69e7a293dmsft-kb5020623-aae384ee-ab75-4498-a42c-8ca88428e6d6msft-kb5020623-b3755673-f514-4e14-b4bf-f2257d3a2198msft-kb5020624-2f7245ba-a770-495e-94a6-d1cf14573b7bmsft-kb5020627-5abac6d0-c0eb-4df2-b4ab-27f864f89461msft-kb5020627-984a6914-077e-44c2-baa3-1740241bf5b1msft-kb5020627-a1d1459a-2cb0-4239-9495-5da401c03d88msft-kb5020632-e1b16be8-10e2-4eab-a970-08e156a5aebemsft-kb5020695-346b295c-1f3c-4a03-b6f8-156bd5458d36-kb5020617msft-kb5020695-346b295c-1f3c-4a03-b6f8-156bd5458d36-kb5020624
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.