CVE-2024-34102 (Last Update: 17.07.2024 16:44) - Products: Adobe Commerce - Info: XXE can expose crypt key and other secrets granting full admin access || CVE-2023-23415 (Last Update: 16.07.2024 22:00) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 20H2, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability || CVE-2019-1213 (Last Update: 16.07.2024 21:54) - Products: Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2 - Info: Windows DHCP Server Remote Code Execution Vulnerability || CVE-2023-21708 (Last Update: 16.07.2024 01:07) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 20H2, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Remote Procedure Call Runtime Remote Code Execution Vulnerability || CVE-2023-23397 (Last Update: 16.07.2024 01:07) - Products: Microsoft Office LTSC 2021, Microsoft Outlook 2016, Microsoft 365 Apps for Enterprise, Microsoft Office 2019, Microsoft Outlook 2013 Service Pack 1 - Info: Microsoft Outlook Elevation of Privilege Vulnerability || CVE-2023-23392 (Last Update: 16.07.2024 01:07) - Products: Windows Server 2022, Windows 11 version 21H2, Windows 11 version 22H2 - Info: HTTP Protocol Stack Remote Code Execution Vulnerability || CVE-2024-38089 (Last Update: 12.07.2024 23:46) - Products: Microsoft Defender for IoT - Info: Microsoft Defender for IoT Elevation of Privilege Vulnerability || CVE-2024-38076 (Last Update: 12.07.2024 23:46) - Products: Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows Server 2022, 23H2 Edition (Server Core installation), Windows Server 2016, Windows Server 2016 (Server Core installation) - Info: Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability || CVE-2024-38074 (Last Update: 12.07.2024 23:46) - Products: Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows Server 2022, 23H2 Edition (Server Core installation), Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability || CVE-2024-38077 (Last Update: 12.07.2024 23:45) - Products: Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows Server 2022, 23H2 Edition (Server Core installation), Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability || CVE-2023-35365 (Last Update: 12.07.2024 14:05) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability || CVE-2023-36434 (Last Update: 09.07.2024 19:41) - Products: Windows 10 Version 22H2, Windows 11 version 22H2, Windows 11 version 21H2, Windows 10 Version 21H2, Windows Server 2022, Windows Server 2019, Windows 10 Version 1809, Windows 10 Version 1607, Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2012 (Server Core installation), Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012 R2, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2016, Windows 10 Version 1507, Windows Server 2019 (Server Core installation), Windows Server 2008 R2 Service Pack 1, Windows Server 2012, Windows Server 2012 R2 (Server Core installation) - Info: Windows IIS Server Elevation of Privilege Vulnerability || CVE-2023-35349 (Last Update: 09.07.2024 19:41) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability || CVE-2022-37968 (Last Update: 09.07.2024 17:23) - Products: Azure Arc-enabled Kubernetes cluster 1.8.11, Azure Arc-enabled Kubernetes cluster 1.7.18, Azure Arc-enabled Kubernetes cluster 1.5.8, Azure Arc-enabled Kubernetes cluster 1.6.19, Azure Stack Edge - Info: Azure Arc-enabled Kubernetes cluster Connect Elevation of Privilege Vulnerability || CVE-2023-35367 (Last Update: 08.07.2024 16:57) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability || CVE-2021-43215 (Last Update: 02.07.2024 18:35) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows 10 Version 1909, Windows 10 Version 21H1, Windows 10 Version 2004, Windows Server version 2004, Windows 10 Version 20H2, Windows Server version 20H2, Windows 10 Version 21H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows 7, Windows 7 Service Pack 1, Windows 8.1, Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution || CVE-2024-30080 (Last Update: 28.06.2024 22:48) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows 11 version 22H3, Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability || CVE-2022-26809 (Last Update: 24.06.2024 18:28) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows 10 Version 1909, Windows 10 Version 21H1, Windows Server 2022, Windows 10 Version 20H2, Windows Server version 20H2, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows 7, Windows 7 Service Pack 1, Windows 8.1, Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Remote Procedure Call Runtime Remote Code Execution Vulnerability || CVE-2022-24491 (Last Update: 24.06.2024 18:28) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows 10 Version 1909, Windows 10 Version 21H1, Windows Server 2022, Windows 10 Version 20H2, Windows Server version 20H2, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows 8.1, Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Windows Network File System Remote Code Execution Vulnerability || CVE-2022-24497 (Last Update: 24.06.2024 18:27) - Products: Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows 10 Version 1909, Windows 10 Version 21H1, Windows Server 2022, Windows 10 Version 20H2, Windows Server version 20H2, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows 8.1, Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation) - Info: Windows Network File System Remote Code Execution Vulnerability ||

Vertrauen entsteht durch Transparenz.

Finden Sie hier einen Auszug unserer Veröffentlichungen.

Im Zentrum des Cyber-Sturms: TECXERO's Einblicke

Erleben Sie in der neuesten Podcast-Folge von Time4Work, wie Jens Decker, Mitbegründer von TECXERO, einen Ransomware-Angriff meisterte. Entdecken Sie exklusive Strategien und Erkenntnisse direkt aus der Führungsebene, um Ihr Unternehmen vor Cyber-Bedrohungen zu schützen. Hören Sie jetzt rein auf Spotify!

48 Stunden im Cyber-Kriegsgebiet

Jens Decker teilt seine Erfahrungen und wertvolle Lektionen über Krisenmanagement bei einem massiven Cyberangriff.

Du kommst hier nicht rein!

Netzwerksicherheit gegen Cyberangriffe ist wichtig. Unternehmen sollten auf Standards wie Standortvernetzung, sauberes Netzdesign und Zugangskontrolle setzen, um ein sicheres Netzwerk zu schaffen. Experten und Managed Service Provider können dabei helfen.

Endpoint Security: Schutz und Wachsamkeit im digitalen Zeitalter

Entdecken Sie, warum Endpoint Security im Zeitalter ständiger Cyberbedrohungen mehr als nur eine technische Anforderung ist und wie Unternehmen ihre IT-Landschaft effektiv schützen können. Lesen Sie jetzt im Handelsblatt mehr darüber.

SD-WAN vs MPLS: Wann, wo, was?

SD-WAN gewinnt als Standortvernetzungstechnologie an Bedeutung, ersetzt aber nicht vollständig MPLS. Unternehmen sollten die Vor- und Nachteile abwägen und anwendungsspezifische Entscheidungen treffen.

Sie sehen gerade einen Platzhalterinhalt von Spotify. Um auf den eigentlichen Inhalt zuzugreifen, klicken Sie auf die Schaltfläche unten. Bitte beachten Sie, dass dabei Daten an Drittanbieter weitergegeben werden. Mehr Informationen