ติดตั้ง Steam
เข้าสู่ระบบ
|
ภาษา
简体中文 (จีนตัวย่อ)
繁體中文 (จีนตัวเต็ม)
日本語 (ญี่ปุ่น)
한국어 (เกาหลี)
български (บัลแกเรีย)
Čeština (เช็ก)
Dansk (เดนมาร์ก)
Deutsch (เยอรมัน)
English (อังกฤษ)
Español - España (สเปน)
Español - Latinoamérica (สเปน - ลาตินอเมริกา)
Ελληνικά (กรีก)
Français (ฝรั่งเศส)
Italiano (อิตาลี)
Bahasa Indonesia (อินโดนีเซีย)
Magyar (ฮังการี)
Nederlands (ดัตช์)
Norsk (นอร์เวย์)
Polski (โปแลนด์)
Português (โปรตุเกส - โปรตุเกส)
Português - Brasil (โปรตุเกส - บราซิล)
Română (โรมาเนีย)
Русский (รัสเซีย)
Suomi (ฟินแลนด์)
Svenska (สวีเดน)
Türkçe (ตุรกี)
Tiếng Việt (เวียดนาม)
Українська (ยูเครน)
รายงานปัญหาเกี่ยวกับการแปลภาษา
i think this goes back to you not liking what is put up against your own comments...
as of today... no one from steam or steam customer/s has changed the
current status that requires you to have a supported OS to use your games in 2024...
In all seriousness do you just have nothing better to do? You never add anything constructive to any post you engage in.
CVE-2022-30190
Attack Vector Local
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.
/------------------------
CVE-2022-30141
Attack Vector Network
This vulnerability is only exploitable if the MaxReceiveBuffer LDAP policy is set to a value higher than the default value. Systems with the default value of this policy would not be vulnerable.
/---------------------
CVE 2022 26809
Attack Vector Network
To exploit this vulnerability, an unauthenticated attacker would need to send a specially crafted RPC call to an RPC host. This could result in remote code execution on the server side with the same permissions as the RPC service.
Interresting and ?
I didn't look very deep into the ones I picked besides Follina so im sure some of them aren't exploitable under normal conditions but I highly recommend anybody interested in the various vulnerabilities of Windows 7 to checkout CVE Details[www.cvedetails.com] NIST has lots of comprehensive information as well.
Edit: Keep in mind some people on Windows 7 might be using ESU which patches up to Jan 2023.
Have you tryed to reproduce them ? because checking them at ms-advisory and trying to apply it seems a bit different no ?
Aslo using windows in an enterprise envirroment is kinda different that using it like any jo at home .
Thx for the link .eternal.
That's massive ,)
Same as myself i just check what new from time to time but not really follow that
But it seems we have an expert that surelly will be kind anough to share with us it knowledge about the 3 csv that was listed.
1. they dont upgrade and cant use steam in 2024, no more posts from them
2. they go offline to keep using steam on windows 7, no more posts from them
To clarify, once a CVE found (Common Vulnerabilities and Exposures classification) It's then submitted to a group of CNA (CVE Number Authorities) to study it and figure out what caused it and the solution to fix it.
CNA being, many many tech companies working together to resolve the problem. From AMD to Microsoft. A list of such companies here.
https://www.cve.org/PartnerInformation/ListofPartners
For a simplified visual example for those that don't know what RCE does, so the person create little thing where it collects the data, and then replaces data changing the game itself, again this is just to dumb things down so have an idea how bad it can be, which is really bad.
https://www.youtube.com/watch?v=e8CO_e_rKd8