Search Results (Refine Search)
- Keyword (text search): cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5582:*:*:*:*:*:x86:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2024-49113 |
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability Published: December 11, 2024; 9:04:37 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2024-49112 |
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability Published: December 11, 2024; 9:04:37 PM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-49107 |
WmsRepair Service Elevation of Privilege Vulnerability Published: December 11, 2024; 9:04:36 PM -0500 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2024-49105 |
Remote Desktop Client Remote Code Execution Vulnerability Published: December 11, 2024; 9:04:36 PM -0500 |
V4.0:(not available) V3.1: 8.4 HIGH V2.0:(not available) |
CVE-2024-49104 |
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Published: December 11, 2024; 9:04:36 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2024-49102 |
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Published: December 11, 2024; 9:04:35 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2024-49096 |
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability Published: December 11, 2024; 9:04:35 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2024-49090 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability Published: December 11, 2024; 9:04:34 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-49089 |
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Published: December 11, 2024; 9:04:34 PM -0500 |
V4.0:(not available) V3.1: 7.2 HIGH V2.0:(not available) |
CVE-2024-49088 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability Published: December 11, 2024; 9:04:33 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-49084 |
Windows Kernel Elevation of Privilege Vulnerability Published: December 11, 2024; 9:04:33 PM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0:(not available) |
CVE-2024-49082 |
Windows File Explorer Information Disclosure Vulnerability Published: December 11, 2024; 9:04:32 PM -0500 |
V4.0:(not available) V3.1: 6.8 MEDIUM V2.0:(not available) |
CVE-2024-49080 |
Windows IP Routing Management Snapin Remote Code Execution Vulnerability Published: December 11, 2024; 9:04:32 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2024-49079 |
Input Method Editor (IME) Remote Code Execution Vulnerability Published: December 11, 2024; 9:04:32 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-49072 |
Windows Task Scheduler Elevation of Privilege Vulnerability Published: December 11, 2024; 9:04:31 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-49046 |
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:45 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-49039 |
Windows Task Scheduler Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:44 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2024-43646 |
Windows Secure Kernel Mode Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:35 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-43645 |
Windows Defender Application Control (WDAC) Security Feature Bypass Vulnerability Published: November 12, 2024; 1:15:34 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-43644 |
Windows Client-Side Caching Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:34 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |