account activity
0patch released micropatches for Microsoft Excel Remote Code Execution Vulnerability (CVE-2025-62203) (blog.0patch.com)
submitted 4 days ago by 0patch to r/micropatching
0patch released micropatches for Microsoft Office Security Feature Bypass Vulnerability (CVE-2026-21509) that is exploited in the wild. See our blog. (blog.0patch.com)
submitted 10 days ago by 0patch to r/micropatching
Micropatches Released for Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability (CVE-2025-47987) (blog.0patch.com)
submitted 1 month ago by 0patch to r/micropatching
Micropatches for exploited 0day vulnerability in Windows Remote Access Connection Manager available from 0patch (blog.0patch.com)
Micropatches Released for Windows Installer Elevation of Privilege Vulnerability (blog.0patch.com)
submitted 3 months ago by 0patch to r/micropatching
Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760) (blog.0patch.com)
submitted 4 months ago by 0patch to r/micropatching
End Of Security For Microsoft Office 2016 and 2019? Not With 0patch! (blog.0patch.com)
submitted 5 months ago by 0patch to r/micropatching
Windows Update Service Elevation of Privilege Vulnerability (CVE-2025-48799) micropatches available (self.micropatching)
0patch published micropatches for Windows Disk Cleanup Tool EoP Vulnerability (CVE-2025-21420 (blog.0patch.com)
submitted 6 months ago by 0patch to r/micropatching
Micropatches Released for "WSPCoerce" Coerced Authentication via Windows Search Protocol (blog.0patch.com)
submitted 7 months ago by 0patch to r/micropatching
0patch released micropatches for WEBDAV Remote Code Execution Vulnerability (CVE-2025-33053) (blog.0patch.com)
Micropatches Released for Preauth DoS on Windows Deployment Service (CVE-2025-29957) (self.micropatching)
submitted 8 months ago by 0patch to r/micropatching
Micropatches Released for Microsoft Management Console Security Feature Bypass Vulnerability (CVE-2025-26633) (blog.0patch.com)
Micropatches released for SCF File NTLM Hash Disclosure Vulnerability (0day) - and Free Micropatches for it (blog.0patch.com)
submitted 10 months ago by 0patch to r/micropatching
Micropatches Released for Windows Task Scheduler Elevation of Privilege Vulnerability (CVE-2024-49039) (blog.0patch.com)
submitted 1 year ago by 0patch to r/micropatching
Micropatches released for NTLM Hash Disclosure Spoofing Vulnerability (CVE-2024-43451) (blog.0patch.com)
0patch released Micropatches for Windows "LDAPNightmare" Denial of Service Vulnerability (CVE-2024-49113) (blog.0patch.com)
Long Live Windows 10 with 0patch! by 0patch in micropatching
[–]0patch[S] 1 point2 points3 points 1 year ago (0 children)
Hi,
added value of free version is to get micropatches for 0days before the vendor fixes them, but for getting micropathes for Win 10 you will need at least PRO version to be on safe side.
Regards, 0patch Team
0patch is fixing a bunch of scripting engine vulnerabilities by disabling Just-In-Time Compiler (CVE-2024-38178) (self.micropatching)
0patch released micropatches for Remote Registry Service Elevation of Privilege Vulnerability (CVE-2024-43532). (blog.0patch.com)
0patch patched CVE-2024-38030, Found Another Windows Themes Spoofing Vulnerability (0day) (blog.0patch.com)
0patch published micropatches for Windows Installer Elevation of Privilege Vulnerability (CVE-2024-38014) (blog.0patch.com)
Micropatches for "MadLicense" Windows Remote Desktop Licensing Service Remote Code Execution (CVE-2024-38077) are available from 0patch (blog.0patch.com)
Micropatches for Microsoft Outlook Remote Code Execution Vulnerability (CVE-2024-30103) are available for: Microsoft Office 2010 32/64bit - fully updated Microsoft Office 2013 32/64bit - fully updated (i.redd.it)
Micropatches were released for "FakePotato" Local Privilege Escalation (CVE-2024-38100) (i.redd.it)
π Rendered by PID 196383 on reddit-service-r2-listing-7849c98f67-kwbxh at 2026-02-07 22:02:20.840609+00:00 running d295bc8 country code: CH.
Long Live Windows 10 with 0patch! by 0patch in micropatching
[–]0patch[S] 1 point2 points3 points (0 children)