Search Results (Refine Search)
- Keyword (text search): cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20710:*:*:*:*:*:x64:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2024-49090 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability Published: December 11, 2024; 9:04:34 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-49089 |
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Published: December 11, 2024; 9:04:34 PM -0500 |
V4.0:(not available) V3.1: 7.2 HIGH V2.0:(not available) |
CVE-2024-49088 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability Published: December 11, 2024; 9:04:33 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-49084 |
Windows Kernel Elevation of Privilege Vulnerability Published: December 11, 2024; 9:04:33 PM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0:(not available) |
CVE-2024-49082 |
Windows File Explorer Information Disclosure Vulnerability Published: December 11, 2024; 9:04:32 PM -0500 |
V4.0:(not available) V3.1: 6.8 MEDIUM V2.0:(not available) |
CVE-2024-49080 |
Windows IP Routing Management Snapin Remote Code Execution Vulnerability Published: December 11, 2024; 9:04:32 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2024-49079 |
Input Method Editor (IME) Remote Code Execution Vulnerability Published: December 11, 2024; 9:04:32 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-49072 |
Windows Task Scheduler Elevation of Privilege Vulnerability Published: December 11, 2024; 9:04:31 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-49046 |
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:45 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-49039 |
Windows Task Scheduler Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:44 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2024-43645 |
Windows Defender Application Control (WDAC) Security Feature Bypass Vulnerability Published: November 12, 2024; 1:15:34 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-43644 |
Windows Client-Side Caching Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:34 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-43643 |
Windows USB Video Class System Driver Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:34 PM -0500 |
V4.0:(not available) V3.1: 6.8 MEDIUM V2.0:(not available) |
CVE-2024-43641 |
Windows Registry Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:33 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-43638 |
Windows USB Video Class System Driver Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:33 PM -0500 |
V4.0:(not available) V3.1: 6.8 MEDIUM V2.0:(not available) |
CVE-2024-43637 |
Windows USB Video Class System Driver Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:32 PM -0500 |
V4.0:(not available) V3.1: 6.8 MEDIUM V2.0:(not available) |
CVE-2024-43636 |
Win32k Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:32 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-43635 |
Windows Telephony Service Remote Code Execution Vulnerability Published: November 12, 2024; 1:15:32 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2024-43634 |
Windows USB Video Class System Driver Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:32 PM -0500 |
V4.0:(not available) V3.1: 6.8 MEDIUM V2.0:(not available) |
CVE-2024-43628 |
Windows Telephony Service Remote Code Execution Vulnerability Published: November 12, 2024; 1:15:30 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |