Search Results (Refine Search)
- Keyword (text search): cpe:2.3:o:microsoft:windows_11_23h2:10.0.22631.3880:*:*:*:*:*:arm64:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2024-43625 |
Microsoft Windows VMSwitch Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:30 PM -0500 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2024-43624 |
Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:29 PM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43623 |
Windows NT OS Kernel Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:29 PM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43622 |
Windows Telephony Service Remote Code Execution Vulnerability Published: November 12, 2024; 1:15:29 PM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43621 |
Windows Telephony Service Remote Code Execution Vulnerability Published: November 12, 2024; 1:15:29 PM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43620 |
Windows Telephony Service Remote Code Execution Vulnerability Published: November 12, 2024; 1:15:29 PM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43530 |
Windows Update Stack Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:25 PM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43452 |
Windows Registry Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:22 PM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43451 |
NTLM Hash Disclosure Spoofing Vulnerability Published: November 12, 2024; 1:15:22 PM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43449 |
Windows USB Video Class System Driver Elevation of Privilege Vulnerability Published: November 12, 2024; 1:15:21 PM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-38264 |
Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability Published: November 12, 2024; 1:15:21 PM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-38203 |
Windows Package Library Manager Information Disclosure Vulnerability Published: November 12, 2024; 1:15:20 PM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-43615 |
Microsoft OpenSSH for Windows Remote Code Execution Vulnerability Published: October 08, 2024; 2:15:29 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43599 |
Remote Desktop Client Remote Code Execution Vulnerability Published: October 08, 2024; 2:15:27 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43585 |
Code Integrity Guard Security Feature Bypass Vulnerability Published: October 08, 2024; 2:15:26 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43584 |
Windows Scripting Engine Security Feature Bypass Vulnerability Published: October 08, 2024; 2:15:26 PM -0400 |
V4.0:(not available) V3.1: 8.4 HIGH V2.0:(not available) |
CVE-2024-43583 |
Winlogon Elevation of Privilege Vulnerability Published: October 08, 2024; 2:15:26 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43582 |
Remote Desktop Protocol Server Remote Code Execution Vulnerability Published: October 08, 2024; 2:15:25 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43581 |
Microsoft OpenSSH for Windows Remote Code Execution Vulnerability Published: October 08, 2024; 2:15:25 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43574 |
Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability Published: October 08, 2024; 2:15:25 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |