Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2023-36534
Path traversal in Zoom Desktop Client for Windows prior to 5.14.7 may allow an unauthenticated user to enable an escalation of privilege via network access.
Zoom Zoom
9.8
CVSSv3
CVE-2023-38186
Windows Mobile Device Management Elevation of Privilege Vulnerability
Microsoft Windows Server 2022 -
Microsoft Windows 11 22h2 -
Microsoft Windows 10 21h2 -
Microsoft Windows 10 22h2 -
Microsoft Windows 11 21h2 -
9.8
CVSSv3
CVE-2023-35385
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2019 -
Microsoft Windows Server 2022 -
Microsoft Windows 10 1809
Microsoft Windows 10 21h2
Microsoft Windows 10 1607
Microsoft Windows 10 22h2
Microsoft Windows 11 21h2
Microsoft Windows 11 22h2
Microsoft Windows 10 1507
1 Article
9.8
CVSSv3
CVE-2023-39216
Improper input validation in Zoom Desktop Client for Windows prior to 5.14.7 may allow an unauthenticated user to enable an escalation of privilege via network access.
Zoom Zoom
9.8
CVSSv3
CVE-2023-36903
Windows System Assessment Tool Elevation of Privilege Vulnerability
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2019 -
Microsoft Windows Server 2022 -
Microsoft Windows 10 1809
Microsoft Windows 10 21h2
Microsoft Windows 11 21h2
Microsoft Windows 10
Microsoft Windows 10 1607
Microsoft Windows 11 22h2
Microsoft Windows 10 22h2
9.8
CVSSv3
CVE-2023-36910
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2019 -
Microsoft Windows Server 2022 -
Microsoft Windows 10 1809
Microsoft Windows 10 21h2
Microsoft Windows 11 21h2
Microsoft Windows 10
Microsoft Windows 10 1607
Microsoft Windows 11 22h2
Microsoft Windows 10 22h2
1 Article
9.8
CVSSv3
CVE-2023-36911
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2019 -
Microsoft Windows Server 2022 -
Microsoft Windows 10 1809
Microsoft Windows 10 21h2
Microsoft Windows 11 21h2
Microsoft Windows 10
Microsoft Windows 10 1607
Microsoft Windows 11 22h2
Microsoft Windows 10 22h2
1 Article
9.8
CVSSv3
CVE-2023-39143
PaperCut NG and PaperCut MF prior to 22.1.3 on Windows allow path traversal, enabling malicious users to upload, read, or delete arbitrary files. This leads to remote code execution when external device integration is enabled (a very common configuration).
Papercut Papercut Mf
Papercut Papercut Ng
1 Github repository
9.8
CVSSv3
CVE-2022-4146
Expression Language Injection vulnerability in Hitachi Replication Manager on Windows, Linux, Solaris allows Code Injection.This issue affects Hitachi Replication Manager: prior to 8.8.5-02.
Hitachi Replication Manager
9.8
CVSSv3
CVE-2023-26512
CWE-502 Deserialization of Untrusted Data at the rabbitmq-connector plugin module in Apache EventMesh (incubating) V1.7.0\V1.8.0 on windows\linux\mac os e.g. platforms allows malicious users to send controlled message and remote code execute via rabbitmq messages. Users can use t...
Apache Eventmesh
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »