cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-34367,https://securityvulnerability.io/vulnerability/CVE-2023-34367,Full Blind TCP/IP Hijacking Vulnerability in Windows 7 by Microsoft,"Windows 7 is susceptible to a full blind TCP/IP hijacking attack, allowing malicious actors to intercept and manipulate network communications without detection. This vulnerability extends not only to Windows 7 but also affects implementations of TCP/IP, including many IoT devices, making diverse systems increasingly vulnerable. Exploiting this issue through idle scan attacks enables adversaries to gain unauthorized access, posing significant risks to data integrity and overall network security. Organizations relying on affected systems should take appropriate measures to mitigate the risks associated with this vulnerability.",Microsoft,Windows 7,6.5,MEDIUM,0.003980000037699938,false,,false,false,false,,,false,false,,2023-06-14T00:00:00.000Z,0 CVE-2022-35759,https://securityvulnerability.io/vulnerability/CVE-2022-35759,Windows Local Security Authority (LSA) Denial of Service Vulnerability,Windows Local Security Authority (LSA) Denial of Service Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",6.5,MEDIUM,0.0006000000284984708,false,,false,false,false,,,false,false,,2023-05-31T18:07:09.012Z,0 CVE-2022-35758,https://securityvulnerability.io/vulnerability/CVE-2022-35758,Windows Kernel Memory Information Disclosure Vulnerability,Windows Kernel Memory Information Disclosure Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",5.5,MEDIUM,0.0006200000061653554,false,,false,false,false,,,false,false,,2023-05-31T18:07:08.480Z,0 CVE-2022-35756,https://securityvulnerability.io/vulnerability/CVE-2022-35756,Windows Kerberos Elevation of Privilege Vulnerability,"A vulnerability in the Windows Kerberos authentication system could allow an attacker to elevate their privileges within a security context. By exploiting this flaw, unauthorized users may gain elevated access to sensitive resources or perform actions that require higher privileges than those assigned to them, which may lead to further system compromise. Organizations are advised to apply the necessary security updates promptly.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2023-05-31T18:07:07.466Z,0 CVE-2022-35753,https://securityvulnerability.io/vulnerability/CVE-2022-35753,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,"The Windows Secure Socket Tunneling Protocol (SSTP) contains a vulnerability that allows an attacker to execute arbitrary code remotely. This issue can arise when the SSTP service improperly handles requests, leading to potential system compromise. Ensuring that systems using SSTP are updated and secured is crucial for maintaining robust cybersecurity measures against exploitation.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,,false,false,false,,,false,false,,2023-05-31T18:07:05.840Z,0 CVE-2022-35752,https://securityvulnerability.io/vulnerability/CVE-2022-35752,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,"The Windows Secure Socket Tunneling Protocol (SSTP) is susceptible to a remote code execution vulnerability that may allow an attacker to execute arbitrary code on the affected system if they successfully exploit the vulnerability. Successful exploitation could enable attackers to gain control over the affected system, leading to unauthorized access or further compromise of the security. Users are advised to apply security updates and follow best practices to mitigate potential risks.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,,false,false,false,,,false,false,,2023-05-31T18:07:05.297Z,0 CVE-2022-35751,https://securityvulnerability.io/vulnerability/CVE-2022-35751,Windows Hyper-V Elevation of Privilege Vulnerability,"The Windows Hyper-V elevation of privilege vulnerability allows attackers to gain elevated permissions on affected systems, potentially compromising sensitive resources. This issue arises from the incorrect handling of objects in memory, leading to unintended access to privileged operations. Users are encouraged to apply the latest patches from Microsoft to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004900000058114529,false,,false,false,false,,,false,false,,2023-05-31T18:07:04.776Z,0 CVE-2022-35750,https://securityvulnerability.io/vulnerability/CVE-2022-35750,Win32k Elevation of Privilege Vulnerability,"The Win32k Elevation of Privilege vulnerability allows an attacker to execute arbitrary code with elevated privileges on affected Microsoft Windows systems. By exploiting this flaw, an unauthorized user can gain access and control over system processes, potentially leading to widespread system compromise. This vulnerability is particularly critical as it can be triggered by an application running on the affected system. Microsoft has released guidance on mitigating this risk to help users protect their environments.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004900000058114529,false,,false,false,false,,,false,false,,2023-05-31T18:07:04.236Z,0 CVE-2022-35747,https://securityvulnerability.io/vulnerability/CVE-2022-35747,Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability,Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",5.9,MEDIUM,0.0006000000284984708,false,,false,false,false,,,false,false,,2023-05-31T18:07:02.694Z,0 CVE-2022-35745,https://securityvulnerability.io/vulnerability/CVE-2022-35745,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,"The Windows Secure Socket Tunneling Protocol (SSTP) is susceptible to a vulnerability that enables remote attackers to execute arbitrary code on affected systems. This flaw allows unauthorized access to sensitive system resources, potentially leading to the compromise of the entire system. Organizations using vulnerable versions should prioritize applying recommended patches to mitigate risk and ensure ongoing system integrity.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.0013099999632686377,false,,false,false,false,,,false,false,,2023-05-31T18:07:01.505Z,0 CVE-2022-35744,https://securityvulnerability.io/vulnerability/CVE-2022-35744,Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability,"The Windows Point-to-Point Protocol (PPP) features a vulnerability that could allow remote code execution. Attackers exploiting this issue could potentially gain unauthorized access to the system, enabling them to execute arbitrary code. This can lead to a variety of risks, including data breaches and system integrity issues. Organizations using Windows operating systems with PPP should apply necessary patches and updates to mitigate this risk.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",9.8,CRITICAL,0.00171999994199723,false,,false,false,false,,,false,false,,2023-05-31T18:07:00.959Z,0 CVE-2022-35743,https://securityvulnerability.io/vulnerability/CVE-2022-35743,Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability,"The Microsoft Windows Support Diagnostic Tool (MSDT) has a security flaw that allows an attacker to execute arbitrary code on the victim's system without authorization. This vulnerability is initiated when a specially crafted file is processed by the MSDT. Successful exploitation can lead to complete system compromise, allowing attackers to install programs, view, change, or delete data, and create new accounts with full user rights. Users are advised to apply security updates to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0011599999852478504,false,,false,false,false,,,false,false,,2023-05-31T18:07:00.424Z,0 CVE-2023-21750,https://securityvulnerability.io/vulnerability/CVE-2023-21750,Windows Kernel Elevation of Privilege Vulnerability,"The Windows Kernel Elevation of Privilege Vulnerability allows an attacker to exploit the vulnerabilities within the Windows Kernel, potentially gaining elevated permissions. This could enable malicious users to execute arbitrary code in the context of a system account, providing opportunities for further exploitation, data manipulation, or unauthorized access. Implementing the latest security updates is crucial to mitigate risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.1,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2023-01-10T00:00:00.000Z,0 CVE-2023-21747,https://securityvulnerability.io/vulnerability/CVE-2023-21747,Windows Kernel Elevation of Privilege Vulnerability,"An elevation of privilege vulnerability exists in the Windows Kernel when it fails to properly handle objects in memory. An attacker who successfully exploits this vulnerability could run arbitrary code with elevated privileges. This could allow the attacker to install programs, view or change data, or create new accounts with full user rights. Affected users are encouraged to apply updates as soon as possible to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0015399999683722854,false,,false,false,false,,,false,false,,2023-01-10T00:00:00.000Z,0 CVE-2023-21749,https://securityvulnerability.io/vulnerability/CVE-2023-21749,Windows Kernel Elevation of Privilege Vulnerability,"This vulnerability in the Windows Kernel could allow an attacker to elevate their privileges on affected systems. By exploiting this flaw, potential threats could gain unauthorized access to sensitive system resources, posing significant risks to system integrity and data protection. Microsoft has released an advisory to address and mitigate this issue, emphasizing the importance of timely updates and security measures to safeguard against such vulnerabilities.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2023-01-10T00:00:00.000Z,0 CVE-2023-21752,https://securityvulnerability.io/vulnerability/CVE-2023-21752,Windows Backup Service Elevation of Privilege Vulnerability,"A vulnerability exists in the Windows Backup Service that allows an attacker to gain elevated privileges on an affected system. By exploiting this flaw, an unauthorized user could execute arbitrary code with elevated permissions, potentially compromising system integrity and security. It is crucial for users and administrators to apply the latest security updates provided by Microsoft to mitigate this risk and protect sensitive data.",Microsoft,"Windows 10 Version 22h2,Windows 11 Version 22h2,Windows 10 Version 21h2,Windows 11 Version 21h2,Windows 10 Version 20h2,Windows 10 Version 1809,Windows 10 Version 1607,Windows 7 Service Pack 1,Windows 10 Version 1507,Windows 7",7.1,HIGH,0.000910000002477318,false,,false,false,true,2023-08-10T16:55:06.000Z,true,false,false,,2023-01-10T00:00:00.000Z,0 CVE-2023-21552,https://securityvulnerability.io/vulnerability/CVE-2023-21552,Windows GDI Elevation of Privilege Vulnerability,"A vulnerability in the Windows Graphics Device Interface (GDI) was identified that could allow an attacker to elevate their privileges. The exploitation of this flaw may enable users to run arbitrary code with elevated system privileges, granting them unauthorized access to sensitive information or the ability to manipulate system processes. Users are advised to apply the latest updates provided by the vendor to mitigate this vulnerability effectively.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0012100000167265534,false,,false,false,false,,,false,false,,2023-01-10T00:00:00.000Z,0 CVE-2023-21541,https://securityvulnerability.io/vulnerability/CVE-2023-21541,Windows Task Scheduler Elevation of Privilege Vulnerability,"A vulnerability exists in the Windows Task Scheduler that enables an attacker to gain elevated privileges on affected systems. By exploiting this flaw, attackers can execute code with higher permissions, potentially compromising system integrity and data confidentiality. Affected users are urged to apply the recommended patches to their systems as advised by vendor advisories. For further details, consult the official advisory from Microsoft.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2023-01-10T00:00:00.000Z,0 CVE-2023-21543,https://securityvulnerability.io/vulnerability/CVE-2023-21543,Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability,"A vulnerability in the Windows Layer 2 Tunneling Protocol (L2TP) allows a remote attacker to execute arbitrary code on the affected system. Exploitation of this vulnerability could lead to significant security risks, potentially compromising sensitive data and system integrity. Organizations using Windows-based systems should apply patches and updates as recommended to mitigate the risk associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.004240000154823065,false,,false,false,false,,,false,false,,2023-01-10T00:00:00.000Z,0 CVE-2023-21675,https://securityvulnerability.io/vulnerability/CVE-2023-21675,Windows Kernel Elevation of Privilege Vulnerability,"A security flaw within the Windows kernel allows attackers to gain elevated privileges on affected systems. By exploiting this vulnerability, an attacker may execute arbitrary code or take control of affected systems, compromising sensitive data and system integrity. Users and administrators are advised to apply the latest security updates to mitigate risks associated with this vulnerability. For detailed information and patching guidance, refer to the official Microsoft advisory.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2023-01-10T00:00:00.000Z,0 CVE-2023-21546,https://securityvulnerability.io/vulnerability/CVE-2023-21546,Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability,"The vulnerability in the Windows Layer 2 Tunneling Protocol (L2TP) could allow an attacker to execute arbitrary code on the system, potentially taking control of the affected device. Exploitation requires that an attacker send specifically crafted packets to an impacted system, making this vector a significant risk to network security. For detailed mitigation and guidance, visit Microsoft's official advisory.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.004339999984949827,false,,false,false,false,,,false,false,,2023-01-10T00:00:00.000Z,0 CVE-2023-21548,https://securityvulnerability.io/vulnerability/CVE-2023-21548,Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability,"The Windows Secure Socket Tunneling Protocol (SSTP) is impacted by a vulnerability that allows remote code execution, posing significant risks if exploited. This flaw enables attackers to execute arbitrary code on the affected system, which could lead to unauthorized access and data breaches. It's essential for users and administrators to apply updates and patches provided by Microsoft to mitigate this risk effectively.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.004240000154823065,false,,false,false,false,,,false,false,,2023-01-10T00:00:00.000Z,0 CVE-2023-21527,https://securityvulnerability.io/vulnerability/CVE-2023-21527,Windows iSCSI Service Denial of Service Vulnerability,"The Windows iSCSI Service is susceptible to a Denial of Service vulnerability that can be exploited to make the service unavailable, potentially impacting system performance and access to storage resources. This vulnerability requires an attacker to send specially crafted requests to the iSCSI service, leading to service interruptions and denial of access for legitimate users. It is essential for system administrators to apply patches and monitor their systems to mitigate the risk associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Windows 10 Version 22h2,Windows 11 Version 22h2",7.5,HIGH,0.0009500000160187483,false,,false,false,false,,,false,false,,2023-01-10T00:00:00.000Z,0 CVE-2023-21728,https://securityvulnerability.io/vulnerability/CVE-2023-21728,Windows Netlogon Denial of Service Vulnerability,"The Windows Netlogon Denial of Service vulnerability allows attackers to disrupt the normal operations of Windows authentication services. By exploiting this weakness, an attacker can prevent users from authenticating to the Windows domain, leading to system accessibility issues and potential downtime. Organizations utilizing Windows Server, Windows 10, and Windows 11 should remain vigilant and apply the latest security updates to mitigate the risk.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.5,HIGH,0.0009500000160187483,false,,false,false,false,,,false,false,,2023-01-10T00:00:00.000Z,0 CVE-2023-21532,https://securityvulnerability.io/vulnerability/CVE-2023-21532,Windows GDI Elevation of Privilege Vulnerability,"The Windows GDI Elevation of Privilege Vulnerability allows attackers to execute arbitrary code with elevated privileges. This flaw can be exploited through malicious applications or code, granting unauthorized access to system resources, which may lead to severe system compromises. It is vital for users and organizations to apply the latest security updates to mitigate the risk associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7,HIGH,0.027230000123381615,false,,false,false,false,,,false,false,,2023-01-10T00:00:00.000Z,0