A vulnerability has been found in Microsoft Windows (Operating System) and classified as critical. Affected by this vulnerability is an unknown code block of the component DNS Snap-In. Applying a patch is able to eliminate this problem. A possible mitigation has been published immediately after the disclosure of the vulnerability.
Microsoft Windows 7 SP1 up to Server 2019 DNS Snap-In Remote Code Execution
- Virtual Patching
- July 14, 2021
- 7:05 am
CVE-2023-2851 : AGT TECH CEPPATRON SQL INJECTION
Description Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in AGT Tech Ceppatron allows Command
CVE-2023-2868 : BARRACUDA EMAIL SECURITY GATEWAY UP TO 9.2.0.006 TAR FILE COMMAND INJECTION
Description A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions
CVE-2023-1424 : MITSUBISHI ELECTRIC MELSEC IQ-F PACKETS BUFFER OVERFLOW
Description Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU