cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-34367,https://securityvulnerability.io/vulnerability/CVE-2023-34367,,"Windows 7 is vulnerable to a full blind TCP/IP hijacking attack. The vulnerability exists in Windows 7 (any Windows until Windows 8) and in any implementation of TCP/IP, which is vulnerable to the Idle scan attack (including many IoT devices). NOTE: The vendor considers this a low severity issue.",Microsoft,Windows 7,6.5,MEDIUM,0.003980000037699938,false,false,false,false,,false,false,2023-06-14T00:00:00.000Z,0 CVE-2022-35759,https://securityvulnerability.io/vulnerability/CVE-2022-35759,Windows Local Security Authority (LSA) Denial of Service Vulnerability,Windows Local Security Authority (LSA) Denial of Service Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",6.5,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:09.012Z,0 CVE-2022-35758,https://securityvulnerability.io/vulnerability/CVE-2022-35758,Windows Kernel Memory Information Disclosure Vulnerability,Windows Kernel Memory Information Disclosure Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",5.5,MEDIUM,0.0006200000061653554,false,false,false,false,,false,false,2023-05-31T18:07:08.480Z,0 CVE-2022-35756,https://securityvulnerability.io/vulnerability/CVE-2022-35756,Windows Kerberos Elevation of Privilege Vulnerability,"A vulnerability in the Windows Kerberos authentication system could allow an attacker to elevate their privileges within a security context. By exploiting this flaw, unauthorized users may gain elevated access to sensitive resources or perform actions that require higher privileges than those assigned to them, which may lead to further system compromise. Organizations are advised to apply the necessary security updates promptly.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:07.466Z,0 CVE-2022-35753,https://securityvulnerability.io/vulnerability/CVE-2022-35753,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,"The Windows Secure Socket Tunneling Protocol (SSTP) contains a vulnerability that allows an attacker to execute arbitrary code remotely. This issue can arise when the SSTP service improperly handles requests, leading to potential system compromise. Ensuring that systems using SSTP are updated and secured is crucial for maintaining robust cybersecurity measures against exploitation.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-05-31T18:07:05.840Z,0 CVE-2022-35752,https://securityvulnerability.io/vulnerability/CVE-2022-35752,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,"The Windows Secure Socket Tunneling Protocol (SSTP) is susceptible to a remote code execution vulnerability that may allow an attacker to execute arbitrary code on the affected system if they successfully exploit the vulnerability. Successful exploitation could enable attackers to gain control over the affected system, leading to unauthorized access or further compromise of the security. Users are advised to apply security updates and follow best practices to mitigate potential risks.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-05-31T18:07:05.297Z,0 CVE-2022-35751,https://securityvulnerability.io/vulnerability/CVE-2022-35751,Windows Hyper-V Elevation of Privilege Vulnerability,"The Windows Hyper-V elevation of privilege vulnerability allows attackers to gain elevated permissions on affected systems, potentially compromising sensitive resources. This issue arises from the incorrect handling of objects in memory, leading to unintended access to privileged operations. Users are encouraged to apply the latest patches from Microsoft to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004900000058114529,false,false,false,false,,false,false,2023-05-31T18:07:04.776Z,0 CVE-2022-35750,https://securityvulnerability.io/vulnerability/CVE-2022-35750,Win32k Elevation of Privilege Vulnerability,"The Win32k Elevation of Privilege vulnerability allows an attacker to execute arbitrary code with elevated privileges on affected Microsoft Windows systems. By exploiting this flaw, an unauthorized user can gain access and control over system processes, potentially leading to widespread system compromise. This vulnerability is particularly critical as it can be triggered by an application running on the affected system. Microsoft has released guidance on mitigating this risk to help users protect their environments.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004900000058114529,false,false,false,false,,false,false,2023-05-31T18:07:04.236Z,0 CVE-2022-35747,https://securityvulnerability.io/vulnerability/CVE-2022-35747,Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability,Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",5.9,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:02.694Z,0 CVE-2022-35745,https://securityvulnerability.io/vulnerability/CVE-2022-35745,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,"The Windows Secure Socket Tunneling Protocol (SSTP) is susceptible to a vulnerability that enables remote attackers to execute arbitrary code on affected systems. This flaw allows unauthorized access to sensitive system resources, potentially leading to the compromise of the entire system. Organizations using vulnerable versions should prioritize applying recommended patches to mitigate risk and ensure ongoing system integrity.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-05-31T18:07:01.505Z,0 CVE-2022-35744,https://securityvulnerability.io/vulnerability/CVE-2022-35744,Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability,"The Windows Point-to-Point Protocol (PPP) features a vulnerability that could allow remote code execution. Attackers exploiting this issue could potentially gain unauthorized access to the system, enabling them to execute arbitrary code. This can lead to a variety of risks, including data breaches and system integrity issues. Organizations using Windows operating systems with PPP should apply necessary patches and updates to mitigate this risk.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",9.8,CRITICAL,0.00171999994199723,false,false,false,false,,false,false,2023-05-31T18:07:00.959Z,0 CVE-2022-35743,https://securityvulnerability.io/vulnerability/CVE-2022-35743,Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability,"The Microsoft Windows Support Diagnostic Tool (MSDT) has a security flaw that allows an attacker to execute arbitrary code on the victim's system without authorization. This vulnerability is initiated when a specially crafted file is processed by the MSDT. Successful exploitation can lead to complete system compromise, allowing attackers to install programs, view, change, or delete data, and create new accounts with full user rights. Users are advised to apply security updates to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2023-05-31T18:07:00.424Z,0 CVE-2023-21541,https://securityvulnerability.io/vulnerability/CVE-2023-21541,Windows Task Scheduler Elevation of Privilege Vulnerability,"A vulnerability exists in the Windows Task Scheduler that enables an attacker to gain elevated privileges on affected systems. By exploiting this flaw, attackers can execute code with higher permissions, potentially compromising system integrity and data confidentiality. Affected users are urged to apply the recommended patches to their systems as advised by vendor advisories. For further details, consult the official advisory from Microsoft.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21543,https://securityvulnerability.io/vulnerability/CVE-2023-21543,Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability,"A vulnerability in the Windows Layer 2 Tunneling Protocol (L2TP) allows a remote attacker to execute arbitrary code on the affected system. Exploitation of this vulnerability could lead to significant security risks, potentially compromising sensitive data and system integrity. Organizations using Windows-based systems should apply patches and updates as recommended to mitigate the risk associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.006020000204443932,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21546,https://securityvulnerability.io/vulnerability/CVE-2023-21546,Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability,"The vulnerability in the Windows Layer 2 Tunneling Protocol (L2TP) could allow an attacker to execute arbitrary code on the system, potentially taking control of the affected device. Exploitation requires that an attacker send specifically crafted packets to an impacted system, making this vector a significant risk to network security. For detailed mitigation and guidance, visit Microsoft's official advisory.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.006149999797344208,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21754,https://securityvulnerability.io/vulnerability/CVE-2023-21754,Windows Kernel Elevation of Privilege Vulnerability,"A vulnerability exists in the Windows Kernel that allows an attacker to gain elevated privileges, potentially leading to unauthorized actions within the system. This weakness can be exploited if an attacker runs a specially crafted application on the targeted system. Successful exploitation could allow attackers to install programs, view, change, or delete data, or create new accounts with full user rights. It is crucial for users to apply the recommended patches to mitigate this security risk.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21757,https://securityvulnerability.io/vulnerability/CVE-2023-21757,Windows Layer 2 Tunneling Protocol (L2TP) Denial of Service Vulnerability,"The Windows Layer 2 Tunneling Protocol (L2TP) has a vulnerability that allows a malicious actor to disrupt the service, potentially leading to significant downtime and a loss of availability. Proper patching and monitoring are essential to mitigate the risk associated with this vulnerability. Users are encouraged to review the provided advisory for guidance on securing their systems.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.5,HIGH,0.003530000103637576,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21732,https://securityvulnerability.io/vulnerability/CVE-2023-21732,Microsoft ODBC Driver Remote Code Execution Vulnerability,"A remote code execution vulnerability exists in the Microsoft ODBC Driver, which could allow an attacker to execute arbitrary code on a targeted system. Successful exploitation could enable an attacker to fully compromise the affected system, leading to potential data breaches and unauthorized access. It is essential for users to apply the necessary updates to mitigate this risk.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.007189999800175428,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21679,https://securityvulnerability.io/vulnerability/CVE-2023-21679,Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability,"A vulnerability exists in the Windows Layer 2 Tunneling Protocol (L2TP) that allows for remote code execution, potentially enabling an attacker to take control of affected systems. This issue arises due to improper handling of requests, which may result in the execution of arbitrary code. Continuous monitoring and applying relevant security updates are essential to mitigate associated risks.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.006149999797344208,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21681,https://securityvulnerability.io/vulnerability/CVE-2023-21681,Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability,"The Microsoft SQL Server OLE DB provider is susceptible to a vulnerability that allows remote code execution. This flaw can enable an attacker to execute arbitrary code on the affected system, potentially leading to unauthorized access and control. Organizations utilizing this OLE DB provider should assess their environments for exposure and implement necessary safeguards to mitigate potential threats. For more detailed information, refer to the vendor advisory at Microsoft's official website.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.006020000204443932,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21556,https://securityvulnerability.io/vulnerability/CVE-2023-21556,Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability,"A vulnerability exists in Windows Layer 2 Tunneling Protocol (L2TP) that could allow an attacker to execute arbitrary code on the affected system. By exploiting this flaw, a malicious user could potentially gain access to sensitive data or take control of the system. It is essential for organizations to prioritize patching their systems and implementing security measures to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.006020000204443932,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21726,https://securityvulnerability.io/vulnerability/CVE-2023-21726,Windows Credential Manager User Interface Elevation of Privilege Vulnerability,"This vulnerability allows an attacker to exploit a weakness in the Windows Credential Manager User Interface, potentially enabling them to execute unauthorized actions and gain elevated privileges. Users are advised to review their systems for updates and vulnerabilities to mitigate risks associated with this security issue.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21563,https://securityvulnerability.io/vulnerability/CVE-2023-21563,BitLocker Security Feature Bypass Vulnerability,BitLocker Security Feature Bypass Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",6.8,MEDIUM,0.0006200000061653554,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,245 CVE-2023-21537,https://securityvulnerability.io/vulnerability/CVE-2023-21537,Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability,"The vulnerability in Microsoft Message Queuing (MSMQ) allows an attacker to elevate privileges on affected systems. By exploiting this flaw, unauthorized users may gain higher-level access, potentially leading to sensitive data exposure or system manipulation. Proper evaluation of affected systems is crucial to mitigate risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21675,https://securityvulnerability.io/vulnerability/CVE-2023-21675,Windows Kernel Elevation of Privilege Vulnerability,"A security flaw within the Windows kernel allows attackers to gain elevated privileges on affected systems. By exploiting this vulnerability, an attacker may execute arbitrary code or take control of affected systems, compromising sensitive data and system integrity. Users and administrators are advised to apply the latest security updates to mitigate risks associated with this vulnerability. For detailed information and patching guidance, refer to the official Microsoft advisory.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0