[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

Paid content will be excluded from the download.


Download | Alert*


CVE-2023-21729
Remote Procedure Call Runtime Information Disclosure Vulnerability

CVE-2023-21769
Microsoft Message Queuing Denial of Service Vulnerability

CVE-2023-21727
Remote Procedure Call Runtime Remote Code Execution Vulnerability

CVE-2023-24912
Windows Graphics Component Elevation of Privilege Vulnerability

CVE-2023-28249
Windows Boot Manager Security Feature Bypass Vulnerability

CVE-2023-24884
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

CVE-2023-28248
Windows Kernel Elevation of Privilege Vulnerability

CVE-2023-24883
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability

CVE-2023-28247
Windows Network File System Information Disclosure Vulnerability

CVE-2023-28244
Windows Kerberos Elevation of Privilege Vulnerability

CVE-2023-28243
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

CVE-2023-28241
Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability

CVE-2023-28240
Windows Network Load Balancing Remote Code Execution Vulnerability

CVE-2023-24927
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

CVE-2023-24926
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

CVE-2023-24929
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

CVE-2023-24928
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

CVE-2023-24925
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

CVE-2023-24924
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

CVE-2023-24886
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

CVE-2023-24885
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

CVE-2023-24887
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

CVE-2023-28217
Windows Network Address Translation (NAT) Denial of Service Vulnerability

CVE-2023-28216
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability

CVE-2023-28256
Windows DNS Server Remote Code Execution Vulnerability

CVE-2023-28255
Windows DNS Server Remote Code Execution Vulnerability

CVE-2023-28254
Windows DNS Server Remote Code Execution Vulnerability

CVE-2023-28298
Windows Kernel Denial of Service Vulnerability

CVE-2023-28253
Windows Kernel Information Disclosure Vulnerability

CVE-2023-28252
Windows Common Log File System Driver Elevation of Privilege Vulnerability

CVE-2023-28250
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

CVE-2023-28293
Windows Kernel Elevation of Privilege Vulnerability

CVE-2023-28219
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

CVE-2023-24931
Windows Secure Channel Denial of Service Vulnerability

CVE-2023-28218
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

CVE-2023-28228
Windows Spoofing Vulnerability

CVE-2023-28305
Windows DNS Server Remote Code Execution Vulnerability

CVE-2023-28227
Windows Bluetooth Driver Remote Code Execution Vulnerability

CVE-2023-28226
Windows Enroll Engine Security Feature Bypass Vulnerability

CVE-2023-28225
Windows NTLM Elevation of Privilege Vulnerability

CVE-2023-28269
Windows Boot Manager Security Feature Bypass Vulnerability

CVE-2023-28302
Microsoft Message Queuing Denial of Service Vulnerability

CVE-2023-28224
Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability

CVE-2023-28268
Netlogon RPC Elevation of Privilege Vulnerability

CVE-2023-28223
Windows Domain Name Service Remote Code Execution Vulnerability

CVE-2023-28267
Remote Desktop Protocol Client Information Disclosure Vulnerability

CVE-2023-28222
Windows Kernel Elevation of Privilege Vulnerability

CVE-2023-28266
Windows Common Log File System Driver Information Disclosure Vulnerability

CVE-2023-28221
Windows Error Reporting Service Elevation of Privilege Vulnerability

CVE-2023-28220
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

CVE-2023-28308
Windows DNS Server Remote Code Execution Vulnerability

CVE-2023-21554
Microsoft Message Queuing Remote Code Execution Vulnerability

CVE-2023-28307
Windows DNS Server Remote Code Execution Vulnerability

CVE-2023-28229
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability

CVE-2023-28306
Windows DNS Server Remote Code Execution Vulnerability

CVE-2023-28238
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability

CVE-2023-28237
Windows Kernel Remote Code Execution Vulnerability

CVE-2023-28236
Windows Kernel Elevation of Privilege Vulnerability

CVE-2023-28235
Windows Lock Screen Security Feature Bypass Vulnerability

CVE-2023-28278
Windows DNS Server Remote Code Execution Vulnerability

CVE-2023-28232
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability

CVE-2023-28276
Windows Group Policy Security Feature Bypass Vulnerability

CVE-2023-28231
DHCP Server Service Remote Code Execution Vulnerability

CVE-2023-28275
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

CVE-2023-28274
Windows Win32k Elevation of Privilege Vulnerability

CVE-2023-28273
Windows Clip Service Elevation of Privilege Vulnerability

CVE-2023-28272
Windows Kernel Elevation of Privilege Vulnerability

CVE-2023-28271
Windows Kernel Memory Information Disclosure Vulnerability

CVE-2023-28270
Windows Lock Screen Security Feature Bypass Vulnerability

CVE-2022-43552
A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-alloc ...

*OVAL
oval:org.secpod.oval:def:89027
CPE    4
cpe:/o:microsoft:windows_10:1809::x86
cpe:/o:microsoft:windows_10:1809
cpe:/o:microsoft:windows_server_2019:::x64
cpe:/o:microsoft:windows_10:1809::x64
...

© SecPod Technologies