<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta charset="utf-8">
<meta name="generator" content="pdf2htmlEX">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<link rel="stylesheet" href="https://static.pudn.com/base/css/base.min.css">
<link rel="stylesheet" href="https://static.pudn.com/base/css/fancy.min.css">
<link rel="stylesheet" href="https://static.pudn.com/prod/directory_preview_static/638f0b1a35aa1e4b190857aa/raw.css">
<script src="https://static.pudn.com/base/js/compatibility.min.js"></script>
<script src="https://static.pudn.com/base/js/pdf2htmlEX.min.js"></script>
<script>
try{
pdf2htmlEX.defaultViewer = new pdf2htmlEX.Viewer({});
}catch(e){}
</script>
<title></title>
</head>
<body>
<div id="sidebar" style="display: none">
<div id="outline">
</div>
</div>
<div id="pf1" class="pf w0 h0" data-page-no="1"><div class="pc pc1 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/638f0b1a35aa1e4b190857aa/bg1.jpg"><div class="c x0 y1 w2 h2"><div class="t m0 x1 h3 y2 ff1 fs0 fc0 sc0 ls0 ws0">【漏洞通告】 微软<span class="_ _0"> </span><span class="ff2 sc1">11<span class="_ _0"> </span></span>月多个安全漏洞</div><div class="t m0 x2 h3 y3 ff2 fs0 fc0 sc1 ls0 ws0">1. <span class="ff1 sc0">漏洞详情</span></div><div class="t m0 x3 h3 y4 ff1 fs0 fc0 sc1 ls0 ws0">微软<span class="_ _1"></span>官方<span class="_ _1"></span>发布<span class="_ _1"></span>了<span class="_ _2"> </span><span class="ff3"><span class="_ _3"> </span></span>年<span class="_ _0"> </span><span class="ff3"><span class="_ _3"> </span></span>月的<span class="_ _1"></span>安全<span class="_ _1"></span>更新<span class="_ _1"></span>。本<span class="_ _1"></span>月更<span class="_ _1"></span>新公<span class="_ _1"></span>布了<span class="_"> </span><span class="ff3"><span class="_ _0"> </span></span>个<span class="_ _1"></span>漏洞<span class="_ _1"></span>,</div><div class="t m0 x1 h3 y5 ff1 fs0 fc0 sc1 ls0 ws0">包含<span class="_ _0"> </span><span class="ff3"><span class="_ _0"> </span></span>个特权<span class="_ _1"></span>提升漏洞、<span class="ff3"><span class="_ _3"> </span></span>个远程执行代码漏<span class="_ _1"></span>洞、<span class="ff3"><span class="_ _0"> </span></span>个信<span class="_ _1"></span>息泄露漏洞、<span class="ff3"><span class="_ _3"> </span></span>个</div><div class="t m0 x1 h3 y6 ff1 fs0 fc0 sc1 ls0 ws0">拒绝服务漏洞、<span class="ff3"><span class="_ _0"> </span></span>个安全功能绕过漏洞、<span class="ff3"><span class="_ _0"> </span></span>个欺骗漏洞。</div><div class="t m0 x3 h3 y7 ff1 fs0 fc0 sc1 ls0 ws0">产<span class="_ _4"> </span>品<span class="_ _4"> </span>涉<span class="_ _4"> </span>及<span class="_ _4"> </span><span class="ff3"><span class="_ _5"> </span><span class="_ _5"> </span><span class="_ _6"></span><span class="_ _4"> </span><span class="ff1">、<span class="_ _4"> </span></span><span class="_ _7"> </span><span class="ff1">、<span class="_ _4"> </span></span><span class="_ _5"> </span><span class="_ _0"> </span><span class="_ _6"></span><span class="_ _8"></span><span class="_ _4"> </span><span class="ff1">、<span class="_ _4"> </span></span> <span class="_ _8"></span>!"#</span></div><div class="t m0 x1 h3 y8 ff3 fs0 fc0 sc1 ls0 ws0"> $%<span class="_ _0"> </span><span class="_ _0"> </span>&'<span class="_ _9"> </span><span class="ff1">、<span class="_ _9"> </span></span> !"<span class="_ _8"></span>#<span class="_ _0"> </span><span class="_ _0"> </span>() <span class="_ _9"> </span><span class="ff1">、<span class="_ _9"> </span></span>*+!<span class="_ _0"> </span><span class="_ _0"> </span>,-.<span class="_ _6"></span>/<span class="_ _6"></span>0<span class="_ _9"> </span><span class="ff1">、<span class="_ _9"> </span></span>0!</div><div class="t m0 x1 h3 y9 ff3 fs0 fc0 sc1 ls0 ws0">&#+<span class="_ _a"> </span><span class="ff1">、<span class="_ _a"> </span></span>*<span class="_ _8"></span>+!<span class="_ _b"></span><span class="_ _b"></span>12<span class="_ _a"> </span><span class="ff1">、<span class="_ _a"></span></span>*<span class="_ _8"></span>+!<span class="_ _b"></span><span class="_ _b"></span><span class="_ _6"></span>3!<span class="_ _a"> </span><span class="ff1">、<span class="_ _c"></span></span>*<span class="_ _8"></span>+!<span class="_ _b"></span><span class="_ _b"></span><span class="_ _b"></span><span class="_ _b"></span>"<span class="_ _b"></span><span class="_ _b"></span>#$</div><div class="t m0 x1 h3 ya ff3 fs0 fc0 sc1 ls0 ws0">*<span class="_ _6"></span>3<span class="_ _d"> </span><span class="_ _d"> </span>4(*5<span class="_ _e"> </span><span class="ff1">、<span class="_ _e"> </span></span>*<span class="_ _8"></span>+!<span class="_ _d"> </span><span class="_ _d"> </span>#<span class="_ _d"> </span><span class="_ _d"> </span><span class="_ _8"></span>++<span class="_ _8"></span>!!<span class="_ _d"> </span><span class="_ _d"> </span><span class="_ _f"></span>!#</div><div class="t m0 x1 h3 yb ff3 fs0 fc0 sc1 ls0 ws0">4<span class="_ _6"></span>5<span class="_ _2"> </span><span class="ff1">、<span class="_ _10"> </span></span>*<span class="_ _8"></span>+!<span class="_ _a"> </span><span class="_ _a"> </span>(67<span class="_ _8"></span>2<span class="_ _a"> </span><span class="_ _a"> </span>6'<span class="_ _10"> </span><span class="ff1">、<span class="_ _2"> </span></span>*+!<span class="_ _a"> </span><span class="_ _a"> </span>1<span class="_ _8"></span>#/#/1<span class="_ _8"></span>#<span class="_ _a"> </span><span class="_ _a"> </span><span class="_ _f"></span>%</div><div class="t m0 x1 h3 yc ff3 fs0 fc0 sc1 ls0 ws0">1<span class="_ _8"></span># <span class="_ _1"></span><span class="ff1">、<span class="_ _1"></span></span>*<span class="_ _8"></span>+!<span class="_ _1"></span>1#<span class="_ _1"></span>&.<span class="_ _1"></span>2.#!<span class="_ _1"></span><span class="ff1">、<span class="_ _1"></span></span>*+!<span class="_ _1"></span>& .#%<span class="_ _3"> </span><span class="ff1">和</span></div><div class="t m0 x1 h3 yd ff3 fs0 fc0 sc1 ls0 ws0">*<span class="_ _8"></span>+!*<span class="_ _0"> </span><span class="ff1">等。</span></div><div class="t m0 x3 h3 ye ff1 fs0 fc0 sc1 ls0 ws0">微<span class="_ _1"></span>软<span class="_ _1"></span>本<span class="_ _1"></span>次<span class="_ _1"></span>共<span class="_ _1"></span>修<span class="_ _1"></span>复<span class="_ _1"></span>了<span class="_ _2"> </span><span class="ff3"><span class="_ _2"> </span></span>个<span class="_ _3"> </span><span class="ff3"><span class="_ _1"></span>+-<span class="_ _2"> </span></span>漏<span class="_ _1"></span>洞<span class="_ _1"></span>,<span class="_ _1"></span>其<span class="_ _1"></span>中<span class="_ _2"> </span><span class="ff3">20//8<span class="_ _2"> </span></span>已<span class="_ _1"></span>被<span class="_ _1"></span>公<span class="_ _1"></span>开<span class="_ _1"></span>披</div><div class="t m0 x1 h3 yf ff1 fs0 fc0 sc1 ls0 ws0">露:</div><div class="t m0 x3 h3 y10 ff2 fs0 fc0 sc1 ls0 ws0">CVE-2022-41128<span class="_ _1"></span><span class="ff1 sc0">:<span class="_ _b"></span></span>Windows <span class="_ _1"></span>Scripting<span class="_ _1"></span> Languages<span class="_ _10"> </span><span class="ff1 sc0">远<span class="_ _1"></span>程<span class="_ _1"></span>代<span class="_ _b"></span>码<span class="_ _1"></span>执</span></div></div></div><div class="pi" data-data='{"ctm":[1.611850,0.000000,0.000000,1.611850,0.000000,0.000000]}'></div></div>
</body>
</html>