CVE-2022-21907 (Last Update: 19.11.2024 18:58) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows 10 Version 21H1, Windows Server 2022, Windows 10 Version 20H2, Windows Server version 20H2, Windows 11 version 21H2, Windows 10 Version 21H2 - Info: HTTP Protocol Stack Remote Code Execution Vulnerability || CVE-2021-26412 (Last Update: 19.11.2024 15:44) - Products: Microsoft Exchange Server 2013 Cumulative Update 23, Microsoft Exchange Server 2019 Cumulative Update 7, Microsoft Exchange Server 2016 Cumulative Update 18, Microsoft Exchange Server 2016 Cumulative Update 19, Microsoft Exchange Server 2019 Cumulative Update 8 - Info: Microsoft Exchange Server Remote Code Execution Vulnerability || CVE-2020-1595 (Last Update: 18.11.2024 16:16) - Products: Microsoft SharePoint Enterprise Server 2016, Microsoft SharePoint Enterprise Server 2013 Service Pack 1, Microsoft SharePoint Server 2019, Microsoft SharePoint Foundation 2013 Service Pack 1 - Info: Microsoft SharePoint Remote Code Execution Vulnerability || CVE-2024-43639 (Last Update: 16.11.2024 23:40) - Products: Windows Server 2025, Windows Server 2025 (Server Core installation), Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows Server 2022, 23H2 Edition (Server Core installation), Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Windows KDC Proxy Remote Code Execution Vulnerability || CVE-2024-43498 (Last Update: 16.11.2024 23:40) - Products: Microsoft Visual Studio 2022 version 17.8, Microsoft Visual Studio 2022 version 17.6, Microsoft Visual Studio 2022 version 17.10, Microsoft Visual Studio 2022 version 17.11, .NET 9.0 - Info: .NET and Visual Studio Remote Code Execution Vulnerability || CVE-2024-43602 (Last Update: 16.11.2024 23:40) - Products: Azure CycleCloud, Azure CycleCloud, Azure CycleCloud 8.0.0, Azure CycleCloud 8.0.1, Azure CycleCloud 8.6.0, Azure CycleCloud, Azure CycleCloud 8.0.2, Azure CycleCloud 8.1.0, Azure CycleCloud 8.2.0, Azure CycleCloud 8.2.1, Azure CycleCloud 8.2.2, Azure CycleCloud 8.4.1, Azure CycleCloud 8.1.1, Azure CycleCloud 8.4.2, Azure CycleCloud 8.4.0, Azure CycleCloud 8.5.0, Azure CycleCloud 8.3.0 - Info: Azure CycleCloud Remote Code Execution Vulnerability || CVE-2022-21969 (Last Update: 14.11.2024 20:07) - Products: Microsoft Exchange Server 2013 Cumulative Update 23, Microsoft Exchange Server 2016 Cumulative Update 21, Microsoft Exchange Server 2019 Cumulative Update 10, Microsoft Exchange Server 2016 Cumulative Update 22, Microsoft Exchange Server 2019 Cumulative Update 11 - Info: Microsoft Exchange Server Remote Code Execution Vulnerability || CVE-2022-21855 (Last Update: 14.11.2024 20:07) - Products: Microsoft Exchange Server 2013 Cumulative Update 23, Microsoft Exchange Server 2016 Cumulative Update 21, Microsoft Exchange Server 2019 Cumulative Update 10, Microsoft Exchange Server 2016 Cumulative Update 22, Microsoft Exchange Server 2019 Cumulative Update 11 - Info: Microsoft Exchange Server Remote Code Execution Vulnerability || CVE-2022-21846 (Last Update: 14.11.2024 20:07) - Products: Microsoft Exchange Server 2016 Cumulative Update 22, Microsoft Exchange Server 2019 Cumulative Update 11, Microsoft Exchange Server 2013 Cumulative Update 23, Microsoft Exchange Server 2016 Cumulative Update 21, Microsoft Exchange Server 2019 Cumulative Update 10 - Info: Microsoft Exchange Server Remote Code Execution Vulnerability || CVE-2022-21849 (Last Update: 14.11.2024 20:07) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows 10 Version 1909, Windows 10 Version 21H1, Windows Server 2022, Windows 10 Version 20H2, Windows Server version 20H2, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation) - Info: Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability || CVE-2022-21901 (Last Update: 14.11.2024 20:06) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows 10 Version 1909, Windows 10 Version 21H1, Windows Server 2022, Windows Server version 20H2, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows 8.1, Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Windows Hyper-V Elevation of Privilege Vulnerability || CVE-2024-43468 (Last Update: 12.11.2024 17:22) - Products: Microsoft Configuration Manager - Info: Microsoft Configuration Manager Remote Code Execution Vulnerability || CVE-2024-38124 (Last Update: 12.11.2024 17:22) - Products: Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows Server 2022, 23H2 Edition (Server Core installation), Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Windows Netlogon Elevation of Privilege Vulnerability || CVE-2024-43491 (Last Update: 07.11.2024 17:52) - Products: Windows 10 Version 1507 - Info: Microsoft Windows Update Remote Code Execution Vulnerability || CVE-2022-34722 (Last Update: 17.10.2024 17:48) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows 10 Version 21H1, Windows Server 2022, Windows 10 Version 20H2, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows 7, Windows 7 Service Pack 1, Windows 8.1, Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability || CVE-2024-38175 (Last Update: 16.10.2024 01:53) - Products: Azure Managed Instance for Apache Cassandra - Info: Azure Managed Instance for Apache Cassandra Elevation of Privilege Vulnerability || CVE-2024-38109 (Last Update: 16.10.2024 01:53) - Products: Azure Health Bot - Info: Azure Health Bot Elevation of Privilege Vulnerability || CVE-2024-38140 (Last Update: 16.10.2024 01:53) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation), Windows 11 Version 24H2 - Info: Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability || CVE-2024-38063 (Last Update: 16.10.2024 01:53) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation), Windows 11 Version 24H2 - Info: Windows TCP/IP Remote Code Execution Vulnerability || CVE-2024-38199 (Last Update: 16.10.2024 01:53) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability ||

Vertrauen entsteht durch Transparenz.

Finden Sie hier einen Auszug unserer Veröffentlichungen.

Im Zentrum des Cyber-Sturms: TECXERO's Einblicke

Erleben Sie in der neuesten Podcast-Folge von Time4Work, wie Jens Decker, Mitbegründer von TECXERO, einen Ransomware-Angriff meisterte. Entdecken Sie exklusive Strategien und Erkenntnisse direkt aus der Führungsebene, um Ihr Unternehmen vor Cyber-Bedrohungen zu schützen. Hören Sie jetzt rein auf Spotify!

48 Stunden im Cyber-Kriegsgebiet

Jens Decker teilt seine Erfahrungen und wertvolle Lektionen über Krisenmanagement bei einem massiven Cyberangriff.

Du kommst hier nicht rein!

Netzwerksicherheit gegen Cyberangriffe ist wichtig. Unternehmen sollten auf Standards wie Standortvernetzung, sauberes Netzdesign und Zugangskontrolle setzen, um ein sicheres Netzwerk zu schaffen. Experten und Managed Service Provider können dabei helfen.

Endpoint Security: Schutz und Wachsamkeit im digitalen Zeitalter

Entdecken Sie, warum Endpoint Security im Zeitalter ständiger Cyberbedrohungen mehr als nur eine technische Anforderung ist und wie Unternehmen ihre IT-Landschaft effektiv schützen können. Lesen Sie jetzt im Handelsblatt mehr darüber.

SD-WAN vs MPLS: Wann, wo, was?

SD-WAN gewinnt als Standortvernetzungstechnologie an Bedeutung, ersetzt aber nicht vollständig MPLS. Unternehmen sollten die Vor- und Nachteile abwägen und anwendungsspezifische Entscheidungen treffen.

Sie sehen gerade einen Platzhalterinhalt von Spotify. Um auf den eigentlichen Inhalt zuzugreifen, klicken Sie auf die Schaltfläche unten. Bitte beachten Sie, dass dabei Daten an Drittanbieter weitergegeben werden. Mehr Informationen