Microsoft Windows Message Queuing denial of service | CVE-2023-38254
NAME__________Microsoft Windows Message Queuing denial of servicePlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10 x32...
NAME__________Microsoft Windows Message Queuing denial of servicePlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10 x32...
NAME__________Microsoft Windows Mobile Device Management privilege escalationPlatforms Affected:Microsoft Windows Server 2022 Microsoft Windows Server (Server Core installation) 2022 Microsoft Windows...
NAME__________Adobe Acrobat and Adobe Reader code executionPlatforms Affected:Adobe Acrobat DC 23.003.20244 Adobe Acrobat Reader DC 23.003.20244 Adobe Acrobat 2020 20.005.30467...
NAME__________Intel NUC BIOS firmware privilege escalationPlatforms Affected:Intel NUC Kit NUC7i3BNH Intel NUC Kit NUC7i3BNK Intel NUC Kit NUC7i3BNHX1 Intel NUC...
NAME__________Microsoft Windows Hyper-V information disclosurePlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10 x64 Microsoft Windows...
NAME__________Siemens Solid Edge code executionPlatforms Affected:Siemens Solid Edge SE2023 VX.223.0 Update 6Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Siemens Solid Edge could allow a...
NAME__________Fortinet FortiOS buffer overflowPlatforms Affected:Fortinet FortiOS 6.2.0 Fortinet FortiOS 6.4.0 Fortinet FortiOS 7.0.0 Fortinet FortiOS 7.0.3Risk Level:6.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Fortinet FortiOS...
NAME__________Microsoft Outlook spoofingPlatforms Affected:Microsoft Outlook 2016 x32 Microsoft Outlook 2016 x64 Microsoft Outlook 2013 SP1 x32 Microsoft Outlook 2013 SP1...
NAME__________Microsoft Windows Message Queuing denial of servicePlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10 x32...
NAME__________Microsoft Dynamics Business Central privilege escalationPlatforms Affected:Microsoft Dynamics 365 Business Central 2023 Release Wave 1Risk Level:7.2Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Microsoft Dynamics Business...
NAME__________Multiple Intel Processors information disclosurePlatforms Affected:Intel Processor familiesRisk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Multiple Intel Processors could allow a local authenticated attacker to...
NAME__________Microsoft Windows Kernel privilege escalationPlatforms Affected:Microsoft Windows 10 x32 Microsoft Windows Server 2016 Microsoft Windows Server 2019 Microsoft Windows 10...
Google has introduced a new security feature in Android 14 that allows IT administrators to disable support for 2G cellular...
Microsoft has patched a total of 74 flaws in its software as part of the company's Patch Tuesday updates for...
Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2023-39526PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10,...
Spotlight on shadow IT ‘Shadow IT’ (also known as ‘grey IT’) is the name given to those unknown IT assets...
To SOC or not to SOC ? So, you are implementing a large digital project, and have followed the GOV.UK...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
A team of researchers from British universities has trained a deep learning model that can steal data from keyboard keystrokes...
The Colorado Department of Higher Education (CDHE) discloses a massive data breach impacting students, past students, and teachers after suffering...
The Clop ransomware gang has once again altered extortion tactics and is now using torrents to leak data stolen in...