cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-35759,https://securityvulnerability.io/vulnerability/CVE-2022-35759,Windows Local Security Authority (LSA) Denial of Service Vulnerability,Windows Local Security Authority (LSA) Denial of Service Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",6.5,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:09.012Z,0 CVE-2022-35758,https://securityvulnerability.io/vulnerability/CVE-2022-35758,Windows Kernel Memory Information Disclosure Vulnerability,Windows Kernel Memory Information Disclosure Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",5.5,MEDIUM,0.0006200000061653554,false,false,false,false,,false,false,2023-05-31T18:07:08.480Z,0 CVE-2022-35756,https://securityvulnerability.io/vulnerability/CVE-2022-35756,Windows Kerberos Elevation of Privilege Vulnerability,"A vulnerability in the Windows Kerberos authentication system could allow an attacker to elevate their privileges within a security context. By exploiting this flaw, unauthorized users may gain elevated access to sensitive resources or perform actions that require higher privileges than those assigned to them, which may lead to further system compromise. Organizations are advised to apply the necessary security updates promptly.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:07.466Z,0 CVE-2022-35753,https://securityvulnerability.io/vulnerability/CVE-2022-35753,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-05-31T18:07:05.840Z,0 CVE-2022-35752,https://securityvulnerability.io/vulnerability/CVE-2022-35752,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,"The Windows Secure Socket Tunneling Protocol (SSTP) is susceptible to a remote code execution vulnerability that may allow an attacker to execute arbitrary code on the affected system if they successfully exploit the vulnerability. Successful exploitation could enable attackers to gain control over the affected system, leading to unauthorized access or further compromise of the security. Users are advised to apply security updates and follow best practices to mitigate potential risks.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-05-31T18:07:05.297Z,0 CVE-2022-35751,https://securityvulnerability.io/vulnerability/CVE-2022-35751,Windows Hyper-V Elevation of Privilege Vulnerability,"The Windows Hyper-V elevation of privilege vulnerability allows attackers to gain elevated permissions on affected systems, potentially compromising sensitive resources. This issue arises from the incorrect handling of objects in memory, leading to unintended access to privileged operations. Users are encouraged to apply the latest patches from Microsoft to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004900000058114529,false,false,false,false,,false,false,2023-05-31T18:07:04.776Z,0 CVE-2022-35750,https://securityvulnerability.io/vulnerability/CVE-2022-35750,Win32k Elevation of Privilege Vulnerability,"The Win32k Elevation of Privilege vulnerability allows an attacker to execute arbitrary code with elevated privileges on affected Microsoft Windows systems. By exploiting this flaw, an unauthorized user can gain access and control over system processes, potentially leading to widespread system compromise. This vulnerability is particularly critical as it can be triggered by an application running on the affected system. Microsoft has released guidance on mitigating this risk to help users protect their environments.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004900000058114529,false,false,false,false,,false,false,2023-05-31T18:07:04.236Z,0 CVE-2022-35747,https://securityvulnerability.io/vulnerability/CVE-2022-35747,Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability,Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",5.9,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:02.694Z,0 CVE-2022-35745,https://securityvulnerability.io/vulnerability/CVE-2022-35745,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-05-31T18:07:01.505Z,0 CVE-2022-35744,https://securityvulnerability.io/vulnerability/CVE-2022-35744,Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability,"The Windows Point-to-Point Protocol (PPP) features a vulnerability that could allow remote code execution. Attackers exploiting this issue could potentially gain unauthorized access to the system, enabling them to execute arbitrary code. This can lead to a variety of risks, including data breaches and system integrity issues. Organizations using Windows operating systems with PPP should apply necessary patches and updates to mitigate this risk.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",9.8,CRITICAL,0.00171999994199723,false,false,false,false,,false,false,2023-05-31T18:07:00.959Z,0 CVE-2022-35743,https://securityvulnerability.io/vulnerability/CVE-2022-35743,Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability,"The Microsoft Windows Support Diagnostic Tool (MSDT) has a security flaw that allows an attacker to execute arbitrary code on the victim's system without authorization. This vulnerability is initiated when a specially crafted file is processed by the MSDT. Successful exploitation can lead to complete system compromise, allowing attackers to install programs, view, change, or delete data, and create new accounts with full user rights. Users are advised to apply security updates to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2023-05-31T18:07:00.424Z,0 CVE-2023-21541,https://securityvulnerability.io/vulnerability/CVE-2023-21541,Windows Task Scheduler Elevation of Privilege Vulnerability,Windows Task Scheduler Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21527,https://securityvulnerability.io/vulnerability/CVE-2023-21527,Windows iSCSI Service Denial of Service Vulnerability,Windows iSCSI Service Denial of Service Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Windows 10 Version 22h2,Windows 11 Version 22h2",7.5,HIGH,0.0009500000160187483,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21537,https://securityvulnerability.io/vulnerability/CVE-2023-21537,Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability,Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21532,https://securityvulnerability.io/vulnerability/CVE-2023-21532,Windows GDI Elevation of Privilege Vulnerability,Windows GDI Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7,HIGH,0.0011899999808520079,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21542,https://securityvulnerability.io/vulnerability/CVE-2023-21542,Windows Installer Elevation of Privilege Vulnerability,Windows Installer Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7,HIGH,0.0006200000061653554,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21728,https://securityvulnerability.io/vulnerability/CVE-2023-21728,Windows Netlogon Denial of Service Vulnerability,Windows Netlogon Denial of Service Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.5,HIGH,0.0009500000160187483,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21679,https://securityvulnerability.io/vulnerability/CVE-2023-21679,Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability,Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.005189999938011169,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21563,https://securityvulnerability.io/vulnerability/CVE-2023-21563,BitLocker Security Feature Bypass Vulnerability,BitLocker Security Feature Bypass Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",6.8,MEDIUM,0.0006200000061653554,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,242 CVE-2023-21548,https://securityvulnerability.io/vulnerability/CVE-2023-21548,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.00506999995559454,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21556,https://securityvulnerability.io/vulnerability/CVE-2023-21556,Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability,Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.00506999995559454,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21675,https://securityvulnerability.io/vulnerability/CVE-2023-21675,Windows Kernel Elevation of Privilege Vulnerability,Windows Kernel Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21680,https://securityvulnerability.io/vulnerability/CVE-2023-21680,Windows Win32k Elevation of Privilege Vulnerability,Windows Win32k Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0011899999808520079,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21525,https://securityvulnerability.io/vulnerability/CVE-2023-21525,Remote Procedure Call Runtime Denial of Service Vulnerability,Remote Procedure Call Runtime Denial of Service Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",5.3,MEDIUM,0.0009500000160187483,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21543,https://securityvulnerability.io/vulnerability/CVE-2023-21543,Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability,Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.00506999995559454,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0