A vulnerability was found in Microsoft Windows 10/10 1607/10 1809/10 1909/10 20H2/10 21H1/11/Server 2016/Server 2019/Server 20H2/Server up to 2022 (Operating System). It has been classified as critical. Affected is an unknown functionality of the component Security Center API. Applying a patch is able to eliminate this problem. A possible mitigation has been published immediately after the disclosure of the vulnerability.
Microsoft Windows Security Center API Remote Code Execution [CVE-2022-21874]
- Virtual Patching
- January 11, 2022
- 10:08 pm
CVE-2023-32306 : TIME TRACKER UP TO 1.22.13.5791 REPORTS.PHP SQL INJECTION
Description Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and January 2023, and are running
CVE-2023-1834 : ROCKWELL AUTOMATION KINETIX 5500 7.13 TELNET/FTP ACCESS CONTROL
Description Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and January 2023, and are running
CVE-2023-2645 : USR USR-G806 1.0.41 WEB MANAGEMENT PAGE USERNAME/PASSWORD HARD-CODED PASSWORD
Description A vulnerability, which was classified as critical, was found in USR USR-G806 1.0.41. Affected is an unknown function of