Vulnerabilities (CVE)

Filtered by NVD-CWE-noinfo
Total 29575 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-43634 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-11-18 N/A 6.8 MEDIUM
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVE-2024-43635 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-11-18 N/A 8.8 HIGH
Windows Telephony Service Remote Code Execution Vulnerability
CVE-2024-43636 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2024-11-18 N/A 7.8 HIGH
Win32k Elevation of Privilege Vulnerability
CVE-2024-43638 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-11-18 N/A 6.8 MEDIUM
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVE-2024-43639 1 Microsoft 6 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 3 more 2024-11-18 N/A 9.8 CRITICAL
Windows KDC Proxy Remote Code Execution Vulnerability
CVE-2024-43640 1 Microsoft 5 Windows 10 21h2, Windows 10 22h2, Windows 11 22h2 and 2 more 2024-11-18 N/A 7.8 HIGH
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-43641 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-11-18 N/A 7.8 HIGH
Windows Registry Elevation of Privilege Vulnerability
CVE-2024-43642 1 Microsoft 6 Windows 11 22h2, Windows 11 23h2, Windows 11 24h2 and 3 more 2024-11-18 N/A 7.5 HIGH
Windows SMB Denial of Service Vulnerability
CVE-2024-43643 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-11-18 N/A 6.8 MEDIUM
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVE-2024-43646 1 Microsoft 12 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 9 more 2024-11-18 N/A 7.8 HIGH
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVE-2024-43645 1 Microsoft 5 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 2 more 2024-11-18 N/A 7.8 HIGH
Windows Defender Application Control (WDAC) Security Feature Bypass Vulnerability
CVE-2024-43644 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-11-18 N/A 7.8 HIGH
Windows Client-Side Caching Elevation of Privilege Vulnerability
CVE-2024-49046 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-11-18 N/A 7.8 HIGH
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-49048 1 Microsoft 1 Torchgeo 2024-11-18 N/A 8.1 HIGH
TorchGeo Remote Code Execution Vulnerability
CVE-2024-43629 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2024-11-18 N/A 7.8 HIGH
Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2024-49049 1 Microsoft 1 Remote Ssh 2024-11-18 N/A 7.1 HIGH
Visual Studio Code Remote Extension Elevation of Privilege Vulnerability
CVE-2024-49050 1 Microsoft 1 Python Extension 2024-11-18 N/A 8.8 HIGH
Visual Studio Code Python Extension Remote Code Execution Vulnerability
CVE-2024-50148 1 Linux 1 Linux Kernel 2024-11-18 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: bnep: fix wild-memory-access in proto_unregister There's issue as follows: KASAN: maybe wild-memory-access in range [0xdead...108-0xdead...10f] CPU: 3 UID: 0 PID: 2805 Comm: rmmod Tainted: G W RIP: 0010:proto_unregister+0xee/0x400 Call Trace: <TASK> __do_sys_delete_module+0x318/0x580 do_syscall_64+0xc1/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f As bnep_init() ignore bnep_sock_init()'s return value, and bnep_sock_init() will cleanup all resource. Then when remove bnep module will call bnep_sock_cleanup() to cleanup sock's resource. To solve above issue just return bnep_sock_init()'s return value in bnep_exit().
CVE-2024-50144 1 Linux 1 Linux Kernel 2024-11-18 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: drm/xe: fix unbalanced rpm put() with fence_fini() Currently we can call fence_fini() twice if something goes wrong when sending the GuC CT for the tlb request, since we signal the fence and return an error, leading to the caller also calling fini() on the error path in the case of stack version of the flow, which leads to an extra rpm put() which might later cause device to enter suspend when it shouldn't. It looks like we can just drop the fini() call since the fence signaller side will already call this for us. There are known mysterious splats with device going to sleep even with an rpm ref, and this could be one candidate. v2 (Matt B): - Prefer warning if we detect double fini() (cherry picked from commit cfcbc0520d5055825f0647ab922b655688605183)
CVE-2024-49019 1 Microsoft 7 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 4 more 2024-11-18 N/A 7.8 HIGH
Active Directory Certificate Services Elevation of Privilege Vulnerability