Логотип exploitDog
bind:CVE-2019-1222
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1222

Количество 4

Количество 4

nvd логотип

CVE-2019-1222

почти 6 лет назад

A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.

CVSS3: 9.8
EPSS: Средний
msrc логотип

CVE-2019-1222

почти 6 лет назад

Remote Desktop Services Remote Code Execution Vulnerability

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-qvf2-39c6-g8rr

около 3 лет назад

A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services? Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1181, CVE-2019-1182, CVE-2019-1226.

EPSS: Средний
fstec логотип

BDU:2021-06058

почти 6 лет назад

Уязвимость службы удаленного рабочего стола Remote Desktop Services (RDS) операционной системы Microsoft Windows, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1222

A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.

CVSS3: 9.8
14%
Средний
почти 6 лет назад
msrc логотип
CVE-2019-1222

Remote Desktop Services Remote Code Execution Vulnerability

CVSS3: 9.8
14%
Средний
почти 6 лет назад
github логотип
GHSA-qvf2-39c6-g8rr

A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services? Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1181, CVE-2019-1182, CVE-2019-1226.

14%
Средний
около 3 лет назад
fstec логотип
BDU:2021-06058

Уязвимость службы удаленного рабочего стола Remote Desktop Services (RDS) операционной системы Microsoft Windows, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
14%
Средний
почти 6 лет назад

Уязвимостей на страницу