Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ CVE-2023-21682 | Microsoft Windows up to Server 2022 Point-to-Point Protocol information disclosure

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š CVE-2023-21682 | Microsoft Windows up to Server 2022 Point-to-Point Protocol information disclosure


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vuldb.com

A vulnerability, which was classified as problematic, was found in Microsoft Windows. Affected is an unknown function of the component Point-to-Point Protocol. The manipulation leads to information disclosure. This vulnerability is traded as CVE-2023-21682. It is possible to launch the attack remotely. There is no exploit available. It is recommended to apply a patch to fix this issue. ...



๐Ÿ“Œ CVE-2024-20662 | Microsoft Windows Server 2008 R2 SP1 up to Server 2022 Online Certificate Status Protocol information disclosure


๐Ÿ“ˆ 31.56 Punkte

๐Ÿ“Œ Microsoft Windows 8.1/RT 8.1/Server 2012/Server 2012 R2 Remote Desktop Protocol Drive Redirection Information Disclosure


๐Ÿ“ˆ 27.76 Punkte

๐Ÿ“Œ Microsoft Windows up to Server 2019 Remote Desktop Protocol Server information disclosure


๐Ÿ“ˆ 27.76 Punkte

๐Ÿ“Œ Microsoft Windows 8.1/RT 8.1/Server 2012/Server 2012 R2 Remote Desktop Protocol Drive Redirection Information Disclosure


๐Ÿ“ˆ 27.76 Punkte

๐Ÿ“Œ CVE-2022-30214 | Microsoft Windows Server 20H2/Server 2016/Server 2019/Server 2022 DNS Server Privilege Escalation


๐Ÿ“ˆ 27.12 Punkte

๐Ÿ“Œ TLS Protocol/SSL Protocol RC4 Encryption Bar Mitzvah Attack information disclosure


๐Ÿ“ˆ 26.77 Punkte

๐Ÿ“Œ CVE-2022-41097 | Microsoft Windows up to Server 2022 Datacenter Azure Edition Network Policy Server information disclosure


๐Ÿ“ˆ 24.6 Punkte

๐Ÿ“Œ Microsoft Windows up to Server 2016 its:// Protocol information disclosure


๐Ÿ“ˆ 24.38 Punkte

๐Ÿ“Œ Microsoft Windows up to Server 2019 Remote Desktop Protocol information disclosure


๐Ÿ“ˆ 24.38 Punkte

๐Ÿ“Œ Microsoft Windows up to Server 2019 Remote Desktop Protocol information disclosure


๐Ÿ“ˆ 24.38 Punkte

๐Ÿ“Œ Microsoft Windows bis Server 2016 its:// Protocol Information Disclosure


๐Ÿ“ˆ 24.38 Punkte

๐Ÿ“Œ Microsoft Windows up to Server 2019 Remote Desktop Protocol information disclosure


๐Ÿ“ˆ 24.38 Punkte

๐Ÿ“Œ Microsoft Windows up to Server 2019 Remote Desktop Protocol information disclosure


๐Ÿ“ˆ 24.38 Punkte

๐Ÿ“Œ Microsoft Windows up to Server 2019 Remote Desktop Protocol Client information disclosure


๐Ÿ“ˆ 24.38 Punkte

๐Ÿ“Œ CVE-2024-20655 | Microsoft Windows Server 2008 R2 SP1 up to Server 2022 Online Certificate Status Protocol Privilege Escalation


๐Ÿ“ˆ 23.94 Punkte

๐Ÿ“Œ CVE-2022-30131 | Microsoft Windows Server 20H2/Server 2016/Server 2019/Server 2022 Container Isolation FS Filter Driver Privilege Escalation


๐Ÿ“ˆ 23.74 Punkte

๐Ÿ“Œ CVE-2022-30215 | Microsoft Windows Server 20H2/Server 2016/Server 2019/Server 2022 Active Directory Federation Services Privilege Escalation


๐Ÿ“ˆ 23.74 Punkte

๐Ÿ“Œ Microsoft Windows 2000/Server 2003/XP Server Protocol Driver Server Message Block Heap-based memory corruption


๐Ÿ“ˆ 23.52 Punkte

๐Ÿ“Œ CVE-2022-35753 | Microsoft Windows up to Server 2022 Secure Socket Tunneling Protocol Remote Code Execution


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-35752 | Microsoft Windows up to Server 2022 Secure Socket Tunneling Protocol Remote Code Execution


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-35745 | Microsoft Windows up to Server 2022 Secure Socket Tunneling Protocol Remote Code Execution


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-34714 | Microsoft Windows up to Server 2022 Secure Socket Tunneling Protocol Remote Code Execution


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-34702 | Microsoft Windows up to Server 2022 Secure Socket Tunneling Protocol Remote Code Execution


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-34701 | Microsoft Windows up to Server 2022 Secure Socket Tunneling Protocol denial of service


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-35794 | Microsoft Windows up to Server 2022 Secure Socket Tunneling Protocol Remote Code Execution


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-35767 | Microsoft Windows up to Server 2022 Secure Socket Tunneling Protocol Remote Code Execution


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-35767 | Microsoft Windows up to Server 2022 Secure Socket Tunneling Protocol Remote Code Execution


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-35766 | Microsoft Windows up to Server 2022 Secure Socket Tunneling Protocol Remote Code Execution


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-35766 | Microsoft Windows up to Server 2022 Secure Socket Tunneling Protocol Remote Code Execution


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-34722 | Microsoft Windows up to Server 2022 Azure Edition Core Hotpatch IKE Protocol Extension Remote Code Execution


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-34721 | Microsoft Windows up to Server 2022 Azure Edition Core Hotpatch IKE Protocol Extension Remote Code Execution


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-38036 | Microsoft Windows 11/Server 2022 IKE Protocol denial of service


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-44670 | Microsoft Windows up to Server 2022 Datacenter Azure Edition Secure Socket Tunneling Protocol Remote Code Execution


๐Ÿ“ˆ 23.17 Punkte

๐Ÿ“Œ CVE-2022-22028 | Microsoft Windows Server 20H2 up to Server 2019 Network File System information disclosure


๐Ÿ“ˆ 21.99 Punkte











matomo