Vulnerabilities (CVE)

Filtered by NVD-CWE-noinfo
Total 28023 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-38125 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-08-16 N/A 7.8 HIGH
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38123 1 Microsoft 1 Windows 11 24h2 2024-08-16 N/A 4.4 MEDIUM
Windows Bluetooth Driver Information Disclosure Vulnerability
CVE-2024-38132 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2024-08-16 N/A 7.5 HIGH
Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVE-2024-38131 1 Microsoft 16 Remote Desktop, Windows 10 1507, Windows 10 1607 and 13 more 2024-08-16 N/A 8.8 HIGH
Clipboard Virtual Channel Extension Remote Code Execution Vulnerability
CVE-2024-38130 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-08-16 N/A 8.8 HIGH
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38128 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2024-08-16 N/A 8.8 HIGH
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38133 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2024-08-16 N/A 7.8 HIGH
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-38189 1 Microsoft 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more 2024-08-16 N/A 8.8 HIGH
Microsoft Project Remote Code Execution Vulnerability
CVE-2024-6347 1 Nissan-global 2 Altima, Blind Spot Detection Sensor Ecu Firmware 2024-08-16 N/A 6.5 MEDIUM
* Unprotected privileged mode access through UDS session in the Blind Spot Detection Sensor ECU firmware in Nissan Altima (2022) allows attackers to trigger denial-of-service (DoS) by unauthorized access to the ECU's programming session. * No preconditions implemented for ECU management functionality through UDS session in the Blind Spot Detection Sensor ECU in Nissan Altima (2022) allows attackers to disrupt normal ECU operations by triggering a control command without authentication.
CVE-2024-38135 1 Microsoft 4 Windows 11 22h2, Windows 11 23h2, Windows 11 24h2 and 1 more 2024-08-16 N/A 7.8 HIGH
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVE-2024-38191 1 Microsoft 13 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 10 more 2024-08-15 N/A 7.8 HIGH
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38195 1 Microsoft 1 Azure Cyclecloud 2024-08-15 N/A 7.8 HIGH
Azure CycleCloud Remote Code Execution Vulnerability
CVE-2024-38196 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-08-15 N/A 7.8 HIGH
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2024-38198 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-08-15 N/A 7.5 HIGH
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2024-38199 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-08-15 N/A 9.8 CRITICAL
Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
CVE-2024-38201 1 Microsoft 1 Azure Stack Hub 2024-08-15 N/A 7.0 HIGH
Azure Stack Hub Elevation of Privilege Vulnerability
CVE-2024-38214 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2024-08-15 N/A 6.5 MEDIUM
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2024-38223 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-08-15 N/A 6.8 MEDIUM
Windows Initial Machine Configuration Elevation of Privilege Vulnerability
CVE-2024-37373 1 Ivanti 1 Avalanche 2024-08-15 N/A 7.2 HIGH
Improper input validation in the Central Filestore in Ivanti Avalanche 6.3.1 allows a remote authenticated attacker with admin rights to achieve RCE.
CVE-2024-34118 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2024-08-15 N/A 5.5 MEDIUM
Illustrator versions 28.5, 27.9.4 and earlier are affected by an Improper Input Validation vulnerability that could lead to an application denial-of-service condition. An attacker could exploit this vulnerability to render the application unresponsive or terminate its execution. Exploitation of this issue requires user interaction in that a victim must open a malicious file.