[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

Paid content will be excluded from the download.


Download | Alert*


CVE-2024-26173
Windows Kernel Elevation of Privilege Vulnerability

CVE-2024-26178
Windows Kernel Elevation of Privilege Vulnerability

CVE-2024-26159
Microsoft ODBC Driver Remote Code Execution Vulnerability

CVE-2024-26174
Windows Kernel Information Disclosure Vulnerability

CVE-2024-21440
Microsoft ODBC Driver Remote Code Execution Vulnerability

CVE-2024-26176
Windows Kernel Elevation of Privilege Vulnerability

CVE-2024-26177
Windows Kernel Information Disclosure Vulnerability

CVE-2024-21432
Windows Update Stack Elevation of Privilege Vulnerability

CVE-2024-21433
Windows Print Spooler Elevation of Privilege Vulnerability

CVE-2024-21430
Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnerability

CVE-2024-21436
Windows Installer Elevation of Privilege Vulnerability

CVE-2024-21437
Windows Graphics Component Elevation of Privilege Vulnerability

CVE-2024-21439
Windows Telephony Server Elevation of Privilege Vulnerability

CVE-2024-26181
Windows Kernel Denial of Service Vulnerability

CVE-2024-26161
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE-2024-26162
Microsoft ODBC Driver Remote Code Execution Vulnerability

CVE-2024-21450
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE-2024-21451
Microsoft ODBC Driver Remote Code Execution Vulnerability

CVE-2024-26166
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE-2024-21444
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE-2024-21441
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE-2024-21446
NTFS Elevation of Privilege Vulnerability

CVE-2024-21407
Windows Hyper-V Remote Code Execution Vulnerability

CVE-2024-21429
Windows USB Hub Driver Remote Code Execution Vulnerability

CVE-2023-28746
Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

*OVAL
oval:org.secpod.oval:def:98484
CPE    2
cpe:/o:microsoft:windows_server_2012:-:-:x64
cpe:/o:microsoft:windows_server_2012:-

© SecPod Technologies