cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-35759,https://securityvulnerability.io/vulnerability/CVE-2022-35759,Windows Local Security Authority (LSA) Denial of Service Vulnerability,Windows Local Security Authority (LSA) Denial of Service Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",6.5,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:09.012Z,0 CVE-2022-35758,https://securityvulnerability.io/vulnerability/CVE-2022-35758,Windows Kernel Memory Information Disclosure Vulnerability,Windows Kernel Memory Information Disclosure Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",5.5,MEDIUM,0.0006200000061653554,false,false,false,false,,false,false,2023-05-31T18:07:08.480Z,0 CVE-2022-35756,https://securityvulnerability.io/vulnerability/CVE-2022-35756,Windows Kerberos Elevation of Privilege Vulnerability,"A vulnerability in the Windows Kerberos authentication system could allow an attacker to elevate their privileges within a security context. By exploiting this flaw, unauthorized users may gain elevated access to sensitive resources or perform actions that require higher privileges than those assigned to them, which may lead to further system compromise. Organizations are advised to apply the necessary security updates promptly.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:07.466Z,0 CVE-2022-35755,https://securityvulnerability.io/vulnerability/CVE-2022-35755,Windows Print Spooler Elevation of Privilege Vulnerability,"This vulnerability allows an attacker with low privileges to elevate their access level within the Windows Print Spooler service. Exploiting this vulnerability could enable malicious actors to execute arbitrary code or gain higher-level access to the system, which poses a significant security risk. Users are advised to apply security updates promptly to mitigate any potential threats associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.3,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:06.943Z,0 CVE-2022-35754,https://securityvulnerability.io/vulnerability/CVE-2022-35754,Unified Write Filter Elevation of Privilege Vulnerability,Unified Write Filter Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows 10 Version 21h1,Windows 11 Version 21h2,Windows Server Version 20h2,Windows 10 Version 1507,Windows Server 2016 (server Core Installation),Windows Server 2019 (server Core Installation),Windows 10 Version 20h2,Windows Server 2019,Windows 10 Version 1607,Windows 8.1,Windows 10 Version 21h2,Windows Server 2016,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2 (server Core Installation),Windows Server 2012 R2",6.7,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:06.372Z,0 CVE-2022-35753,https://securityvulnerability.io/vulnerability/CVE-2022-35753,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,"The Windows Secure Socket Tunneling Protocol (SSTP) contains a vulnerability that allows an attacker to execute arbitrary code remotely. This issue can arise when the SSTP service improperly handles requests, leading to potential system compromise. Ensuring that systems using SSTP are updated and secured is crucial for maintaining robust cybersecurity measures against exploitation.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-05-31T18:07:05.840Z,0 CVE-2022-35752,https://securityvulnerability.io/vulnerability/CVE-2022-35752,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,"The Windows Secure Socket Tunneling Protocol (SSTP) is susceptible to a remote code execution vulnerability that may allow an attacker to execute arbitrary code on the affected system if they successfully exploit the vulnerability. Successful exploitation could enable attackers to gain control over the affected system, leading to unauthorized access or further compromise of the security. Users are advised to apply security updates and follow best practices to mitigate potential risks.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-05-31T18:07:05.297Z,0 CVE-2022-35751,https://securityvulnerability.io/vulnerability/CVE-2022-35751,Windows Hyper-V Elevation of Privilege Vulnerability,"The Windows Hyper-V elevation of privilege vulnerability allows attackers to gain elevated permissions on affected systems, potentially compromising sensitive resources. This issue arises from the incorrect handling of objects in memory, leading to unintended access to privileged operations. Users are encouraged to apply the latest patches from Microsoft to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004900000058114529,false,false,false,false,,false,false,2023-05-31T18:07:04.776Z,0 CVE-2022-35750,https://securityvulnerability.io/vulnerability/CVE-2022-35750,Win32k Elevation of Privilege Vulnerability,"The Win32k Elevation of Privilege vulnerability allows an attacker to execute arbitrary code with elevated privileges on affected Microsoft Windows systems. By exploiting this flaw, an unauthorized user can gain access and control over system processes, potentially leading to widespread system compromise. This vulnerability is particularly critical as it can be triggered by an application running on the affected system. Microsoft has released guidance on mitigating this risk to help users protect their environments.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004900000058114529,false,false,false,false,,false,false,2023-05-31T18:07:04.236Z,0 CVE-2022-35749,https://securityvulnerability.io/vulnerability/CVE-2022-35749,Windows Digital Media Receiver Elevation of Privilege Vulnerability,"The Windows Digital Media Receiver has a vulnerability that allows an attacker with access to the device to elevate privileges, potentially enabling unauthorized actions. This flaw can be exploited to gain higher permissions, circumventing standard security measures. Users are advised to apply the appropriate updates to mitigate risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:03.722Z,0 CVE-2022-35747,https://securityvulnerability.io/vulnerability/CVE-2022-35747,Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability,Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",5.9,MEDIUM,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:02.694Z,0 CVE-2022-35746,https://securityvulnerability.io/vulnerability/CVE-2022-35746,Windows Digital Media Receiver Elevation of Privilege Vulnerability,"A vulnerability exists in the Windows Digital Media Receiver that can allow an attacker to elevate their privileges within the system. This flaw can be exploited to gain higher-level permissions, providing unauthorized access to sensitive functions or data. Proper patching and monitoring are essential to mitigate risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-05-31T18:07:02.139Z,0 CVE-2022-35745,https://securityvulnerability.io/vulnerability/CVE-2022-35745,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,"The Windows Secure Socket Tunneling Protocol (SSTP) is susceptible to a vulnerability that enables remote attackers to execute arbitrary code on affected systems. This flaw allows unauthorized access to sensitive system resources, potentially leading to the compromise of the entire system. Organizations using vulnerable versions should prioritize applying recommended patches to mitigate risk and ensure ongoing system integrity.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-05-31T18:07:01.505Z,0 CVE-2022-35744,https://securityvulnerability.io/vulnerability/CVE-2022-35744,Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability,"The Windows Point-to-Point Protocol (PPP) features a vulnerability that could allow remote code execution. Attackers exploiting this issue could potentially gain unauthorized access to the system, enabling them to execute arbitrary code. This can lead to a variety of risks, including data breaches and system integrity issues. Organizations using Windows operating systems with PPP should apply necessary patches and updates to mitigate this risk.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",9.8,CRITICAL,0.00171999994199723,false,false,false,false,,false,false,2023-05-31T18:07:00.959Z,0 CVE-2022-35743,https://securityvulnerability.io/vulnerability/CVE-2022-35743,Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability,"The Microsoft Windows Support Diagnostic Tool (MSDT) has a security flaw that allows an attacker to execute arbitrary code on the victim's system without authorization. This vulnerability is initiated when a specially crafted file is processed by the MSDT. Successful exploitation can lead to complete system compromise, allowing attackers to install programs, view, change, or delete data, and create new accounts with full user rights. Users are advised to apply security updates to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2023-05-31T18:07:00.424Z,0 CVE-2023-21712,https://securityvulnerability.io/vulnerability/CVE-2023-21712,Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability,"A vulnerability in the Windows Point-to-Point Tunneling Protocol allows an attacker to execute arbitrary code on the target system by sending specially crafted packets. Exploitation of this vulnerability can lead to a complete compromise of the affected machine, granting the attacker full control over system resources and data. Organizations using the affected versions of Windows should ensure that their systems are updated to mitigate the risks associated with this severe vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.001509999972768128,false,false,false,false,,false,false,2023-04-27T19:15:00.000Z,0 CVE-2023-21535,https://securityvulnerability.io/vulnerability/CVE-2023-21535,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,"A vulnerability in the Windows Secure Socket Tunneling Protocol (SSTP) allows an attacker to execute arbitrary code on the affected system. By exploiting this vulnerability, an unauthorized user could potentially gain control over the system, jeopardizing sensitive data and system integrity. It is crucial for users to apply the latest security updates to mitigate risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.006020000204443932,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21558,https://securityvulnerability.io/vulnerability/CVE-2023-21558,Windows Error Reporting Service Elevation of Privilege Vulnerability,"The Windows Error Reporting Service vulnerability allows an attacker to elevate their privileges through a flaw in the service. This could lead to unauthorized access to system resources or data, posing significant risks for users and organizations alike. Proper patches and updates are recommended to mitigate potential exploitation.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21563,https://securityvulnerability.io/vulnerability/CVE-2023-21563,BitLocker Security Feature Bypass Vulnerability,BitLocker Security Feature Bypass Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",6.8,MEDIUM,0.0006200000061653554,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,245 CVE-2023-21549,https://securityvulnerability.io/vulnerability/CVE-2023-21549,Windows SMB Witness Service Elevation of Privilege Vulnerability,"The Windows SMB Witness Service contains a vulnerability that allows an attacker with low privileges to execute arbitrary code with elevated privileges. By exploiting this flaw, an attacker can gain control over the system, potentially leading to unauthorized access to sensitive data and further exploitation of the network. It is essential for users and administrators to apply the appropriate security updates and patches to mitigate this risk effectively.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21541,https://securityvulnerability.io/vulnerability/CVE-2023-21541,Windows Task Scheduler Elevation of Privilege Vulnerability,"A vulnerability exists in the Windows Task Scheduler that enables an attacker to gain elevated privileges on affected systems. By exploiting this flaw, attackers can execute code with higher permissions, potentially compromising system integrity and data confidentiality. Affected users are urged to apply the recommended patches to their systems as advised by vendor advisories. For further details, consult the official advisory from Microsoft.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21537,https://securityvulnerability.io/vulnerability/CVE-2023-21537,Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability,"The vulnerability in Microsoft Message Queuing (MSMQ) allows an attacker to elevate privileges on affected systems. By exploiting this flaw, unauthorized users may gain higher-level access, potentially leading to sensitive data exposure or system manipulation. Proper evaluation of affected systems is crucial to mitigate risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21543,https://securityvulnerability.io/vulnerability/CVE-2023-21543,Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability,"A vulnerability in the Windows Layer 2 Tunneling Protocol (L2TP) allows a remote attacker to execute arbitrary code on the affected system. Exploitation of this vulnerability could lead to significant security risks, potentially compromising sensitive data and system integrity. Organizations using Windows-based systems should apply patches and updates as recommended to mitigate the risk associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.006020000204443932,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21726,https://securityvulnerability.io/vulnerability/CVE-2023-21726,Windows Credential Manager User Interface Elevation of Privilege Vulnerability,"This vulnerability allows an attacker to exploit a weakness in the Windows Credential Manager User Interface, potentially enabling them to execute unauthorized actions and gain elevated privileges. Users are advised to review their systems for updates and vulnerabilities to mitigate risks associated with this security issue.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0 CVE-2023-21524,https://securityvulnerability.io/vulnerability/CVE-2023-21524,Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability,"A vulnerability has been identified in the Local Security Authority (LSA) of Windows, which allows attackers to gain elevated privileges on affected systems. Exploiting this flaw could enable unauthorized access and control over the system, potentially compromising sensitive data and overall system integrity. Users and administrators are advised to apply the necessary security updates as soon as they are available to mitigate risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2023-01-10T00:00:00.000Z,0