Vulnerabilities (CVE)

Filtered by NVD-CWE-noinfo
Total 29514 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-38264 1 Microsoft 5 Windows 11 22h2, Windows 11 23h2, Windows 11 24h2 and 2 more 2024-11-19 N/A 5.9 MEDIUM
Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability
CVE-2024-43449 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-11-19 N/A 6.8 MEDIUM
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVE-2024-43450 1 Microsoft 7 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 4 more 2024-11-19 N/A 7.5 HIGH
Windows DNS Spoofing Vulnerability
CVE-2024-43452 1 Microsoft 11 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 8 more 2024-11-19 N/A 7.5 HIGH
Windows Registry Elevation of Privilege Vulnerability
CVE-2024-43459 1 Microsoft 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 2024-11-19 N/A 8.8 HIGH
SQL Server Native Client Remote Code Execution Vulnerability
CVE-2024-43462 1 Microsoft 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 2024-11-19 N/A 8.8 HIGH
SQL Server Native Client Remote Code Execution Vulnerability
CVE-2024-43498 3 Apple, Linux, Microsoft 5 Macos, Linux Kernel, .net and 2 more 2024-11-19 N/A 9.8 CRITICAL
.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2024-43499 3 Apple, Linux, Microsoft 5 Macos, Linux Kernel, .net and 2 more 2024-11-19 N/A 7.5 HIGH
.NET and Visual Studio Denial of Service Vulnerability
CVE-2024-41167 1 Intel 2 M10jnp2sb, M10jnp2sb Firmware 2024-11-19 N/A 6.7 MEDIUM
Improper input validation in UEFI firmware in some Intel(R) Server Board M10JNP2SB Family may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2024-48993 1 Microsoft 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 2024-11-19 N/A 8.8 HIGH
SQL Server Native Client Remote Code Execution Vulnerability
CVE-2024-8979 1 Wpdeveloper 1 Essential Addons For Elementor 2024-11-19 N/A 5.7 MEDIUM
The Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.0.9 via the 'init_content_lostpassword_user_email_controls' function. This makes it possible for authenticated attackers, with Author-level access and above, to extract sensitive data including usernames and passwords of any user, including Administrators, as long as that user opens the email notification for a password change request and images are not blocked by the email client.
CVE-2024-8978 1 Wpdeveloper 1 Essential Addons For Elementor 2024-11-19 N/A 5.7 MEDIUM
The Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.0.9 via the 'init_content_register_user_email_controls' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including usernames and passwords of any users who register via the Login | Register Form widget, as long as that user opens the email notification for successful registration.
CVE-2024-50204 1 Linux 1 Linux Kernel 2024-11-19 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: fs: don't try and remove empty rbtree node When copying a namespace we won't have added the new copy into the namespace rbtree until after the copy succeeded. Calling free_mnt_ns() will try to remove the copy from the rbtree which is invalid. Simply free the namespace skeleton directly.
CVE-2024-50201 1 Linux 1 Linux Kernel 2024-11-19 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix encoder->possible_clones Include the encoder itself in its possible_clones bitmask. In the past nothing validated that drivers were populating possible_clones correctly, but that changed in commit 74d2aacbe840 ("drm: Validate encoder->possible_clones"). Looks like radeon never got the memo and is still not following the rules 100% correctly. This results in some warnings during driver initialization: Bogus possible_clones: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7) WARNING: CPU: 0 PID: 170 at drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c ... (cherry picked from commit 3b6e7d40649c0d75572039aff9d0911864c689db)
CVE-2024-43530 1 Microsoft 5 Windows 10 21h2, Windows 10 22h2, Windows 11 22h2 and 2 more 2024-11-19 N/A 7.8 HIGH
Windows Update Stack Elevation of Privilege Vulnerability
CVE-2024-43598 1 Microsoft 1 Lightgbm 2024-11-19 N/A 8.1 HIGH
LightGBM Remote Code Execution Vulnerability
CVE-2024-43602 1 Microsoft 1 Azure Cyclecloud 2024-11-19 N/A 9.9 CRITICAL
Azure CycleCloud Remote Code Execution Vulnerability
CVE-2024-43624 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2024-11-19 N/A 8.8 HIGH
Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability
CVE-2024-43626 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-11-19 N/A 7.8 HIGH
Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2024-43630 1 Microsoft 6 Windows 10 21h2, Windows 10 22h2, Windows 11 24h2 and 3 more 2024-11-18 N/A 7.8 HIGH
Windows Kernel Elevation of Privilege Vulnerability