
For more information about this issue, see KB5022083. Addresses an issue on how WPF-based applications render XPS documents. Addresses an issue where using IsReadOnly property of TextBox and RichTextBox in ControlTemplate.Triggers throws an exception. Addresses Null Reference Exception reloading XPS document after adjusting column width for Datagrid and Gridview controls. Addresses Null Reference Exception when ToolTip is visible property is overridden to be always be false. Addresses an issue to avoid ArgumentOutOfRangeException when ControlTemplate has two or more ItemsPresenter sharing a single ItemsCollection. Addresses ArgumentNullException that can arise in apps, or libraries, that directly set the IsOpen property on ToolTips or their Popups. This security update addresses a vulnerability where X509Certificate2 file handling can lead to denial of service.

NET Framework Denial of Service Vulnerability This security update addresses a vulnerability where the AIA fetching process for client certificates can lead to denial of service. This security update addresses a vulnerability in bypass restrictions when deserializing a DataSet or DataTable from XML, leading to an elevation of privilege. NET Framework Elevation of Privilege Vulnerability This security update addresses a vulnerability in the WPF XAML parser where an unsandboxed parser can lead to remote code execution. NET Framework Remote Code Execution Vulnerability This security update addresses a vulnerability in WPF where the BAML offers other ways to instantiate types that leads to an elevation of privilege. This security update addresses a vulnerability in the MSDIA SDK where corrupted PDBs can cause heap overflow, leading to a crash or remove code execution. Before you install this update, see the Prerequisites and Restart requirement sections. We recommend that you apply this update as part of your regular maintenance routines. The Jupdate for Windows 11, version 22H2 includes cumulative security and reliability improvements in. Revised on to fix the link for CVE-2023-32030 Revised to correct the wording of the known issue to X.509 certificate
