cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-49105,https://securityvulnerability.io/vulnerability/CVE-2024-49105,Remote Desktop Client Remote Code Execution Vulnerability,"This vulnerability in the Microsoft Remote Desktop Client allows attackers to execute arbitrary code remotely on the affected systems. When exploited, it could enable an unauthorized user to gain control over the system, posing a severe risk to the integrity and confidentiality of user data. Users of the Remote Desktop Client are strongly advised to apply any available security updates and take precautions to secure their environments against potential exploitation.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Remote Desktop Client For Windows Desktop,Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Windows App Client For Windows Desktop",8.4,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49107,https://securityvulnerability.io/vulnerability/CVE-2024-49107,WmsRepair Service Elevation of Privilege Vulnerability,"The WmsRepair Service has a vulnerability that allows an attacker to elevate privileges, potentially enabling them to execute unauthorized actions on the affected system. This flaw poses significant risks, as it could allow malicious users to gain access to higher-level permissions than intended, compromising the integrity and confidentiality of sensitive data. It is essential for users and organizations utilizing this service to address this vulnerability promptly through available patches and updates to safeguard against possible exploitation.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation)",7.3,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49084,https://securityvulnerability.io/vulnerability/CVE-2024-49084,Windows Kernel Elevation of Privilege Vulnerability,"A vulnerability exists within the Windows Kernel, allowing an attacker to execute arbitrary code with elevated privileges. This flaw can be exploited by sending specially crafted requests to the affected system, becoming a serious concern for users who rely on Windows operating systems. Remediation measures should be promptly implemented to mitigate the potential risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49104,https://securityvulnerability.io/vulnerability/CVE-2024-49104,Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability,"The vulnerability in Windows Routing and Remote Access Service (RRAS) can allow an attacker to execute arbitrary code on the affected system. This occurs when a specially crafted packet is sent to the server, potentially leading to unauthorized access and control. Organizations using the affected versions should apply security mitigations and patches as soon as they become available to protect against possible exploitation.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49124,https://securityvulnerability.io/vulnerability/CVE-2024-49124,Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability,"The vulnerability in the Lightweight Directory Access Protocol (LDAP) Client allows for remote code execution, posing significant security risks for systems implementing this protocol. This flaw could enable an attacker to execute arbitrary code on affected systems, leading to potential data breaches or unauthorized access. Organizations using the LDAP Client must evaluate their systems and apply necessary patches or mitigate strategies outlined in the vendor advisory to safeguard against exploitation.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49118,https://securityvulnerability.io/vulnerability/CVE-2024-49118,Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability,A remote code execution vulnerability exists in Microsoft Message Queuing (MSMQ) when the software fails to properly handle objects in memory. This can allow an attacker to execute arbitrary code in the context of the target user. Exploitation of this vulnerability requires that a user open a specially crafted message. Microsoft has issued an advisory detailing the issue and recommends applying security updates to mitigate potential risks.,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49079,https://securityvulnerability.io/vulnerability/CVE-2024-49079,Input Method Editor (IME) Remote Code Execution Vulnerability,"A security vulnerability exists within the Input Method Editor (IME) that could allow an attacker to execute arbitrary code remotely. The flaw can be exploited if an affected version interacts with maliciously crafted input, leading to unauthorized access and potential data compromise. Users are urged to apply the latest security updates provided by Microsoft to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49082,https://securityvulnerability.io/vulnerability/CVE-2024-49082,Windows File Explorer Information Disclosure Vulnerability,Windows File Explorer Information Disclosure Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",6.8,MEDIUM,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49090,https://securityvulnerability.io/vulnerability/CVE-2024-49090,Windows Common Log File System Driver Elevation of Privilege Vulnerability,"The Windows Common Log File System Driver features a vulnerability that could enable an attacker to elevate their privileges on an affected system. By exploiting this flaw, unauthorized users may gain access to restricted areas of the system, potentially leading to unauthorized actions or access to sensitive data. This issue highlights the importance of maintaining system updates and implementing proactive security measures to mitigate risks associated with privilege escalation vulnerabilities.",Microsoft,"Windows Server 2025,Windows Server 2025 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49102,https://securityvulnerability.io/vulnerability/CVE-2024-49102,Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability,"The vulnerability in the Windows Routing and Remote Access Service (RRAS) poses a significant risk, allowing attackers to execute arbitrary code on vulnerable systems. When exploited, this security flaw can enable unauthorized access to sensitive data and application environments. This vulnerability affects multiple versions of Windows Server and client operating systems, emphasizing the need for organizations to quickly assess their exposure and apply recommended security measures. It is essential for IT administrators to stay updated on patches and mitigation strategies to bolster their security posture against potential attacks leveraging this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49121,https://securityvulnerability.io/vulnerability/CVE-2024-49121,Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability,"The Windows Lightweight Directory Access Protocol (LDAP) vulnerability allows attackers to exploit weaknesses that may lead to a Denial of Service condition. This may result in legitimate requests being denied and services rendered unavailable, affecting the overall stability and security of the affected systems. Organizations relying on Microsoft’s LDAP for authentication and directory services should prioritize updates to safeguard against this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.5,HIGH,0.0004600000102072954,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49122,https://securityvulnerability.io/vulnerability/CVE-2024-49122,Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability,"This vulnerability in Microsoft Message Queuing (MSMQ) allows attackers to execute arbitrary code remotely on affected systems. By exploiting this flaw, malicious actors could potentially gain unauthorized access to sensitive data and execute further malicious activities within the network. This issue underscores the importance of ensuring that all software components are updated regularly to mitigate any potential risks associated with such vulnerabilities.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49127,https://securityvulnerability.io/vulnerability/CVE-2024-49127,Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability,A vulnerability in the Windows Lightweight Directory Access Protocol (LDAP) allows for remote code execution. Attackers can exploit this weakness to execute arbitrary code with the same privileges as the user running the affected application. This could lead to unauthorized access to sensitive data or system resources. Proper security measures and timely updates are crucial to mitigate potential risks associated with this vulnerability.,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49138,https://securityvulnerability.io/vulnerability/CVE-2024-49138,Windows Common Log File System Driver Elevation of Privilege Vulnerability,"The vulnerability in the Windows Common Log File System Driver allows attackers to gain elevated privileges on affected Windows systems. This can lead to unauthorized actions being performed, potentially compromising system integrity. Proper security measures and timely updates are essential to protect against exploitation. Users are urged to apply the necessary patches to mitigate risks associated with this vulnerability, ensuring their systems remain secure against potential threats. For further details on remediation, please refer to the official vendor advisory.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004299999854993075,true,true,false,true,,true,false,2024-12-12T02:04:00.000Z,1987 CVE-2024-49072,https://securityvulnerability.io/vulnerability/CVE-2024-49072,Windows Task Scheduler Elevation of Privilege Vulnerability,"A vulnerability exists in the Windows Task Scheduler that could allow an attacker to elevate privileges on affected systems. This issue arises when the Windows Task Scheduler improperly handles requests, giving malicious actors the opportunity to execute arbitrary code with elevated permissions. Exploitation of this vulnerability could lead to further compromises within the system's environment, emphasizing the importance of applying security updates to mitigate risks associated with unauthorized access. Users are encouraged to adhere to best practices for maintaining system security and regularly check for updates.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49113,https://securityvulnerability.io/vulnerability/CVE-2024-49113,Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability,"The Windows Lightweight Directory Access Protocol (LDAP) Denial of Service vulnerability can cause significant disruptions in the availability of directory services. This issue arises from insufficient handling of certain types of LDAP requests, leading to scenarios where a targeted denial of service attack may disrupt normal operations. Organizations utilizing affected versions of Windows Server and Windows operating systems should be aware of the potential impact on their directory services operations and consider implementing recommended security updates to mitigate risks.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.5,HIGH,0.0004600000102072954,false,false,false,false,,true,false,2024-12-12T02:04:00.000Z,4124 CVE-2024-49080,https://securityvulnerability.io/vulnerability/CVE-2024-49080,Windows IP Routing Management Snapin Remote Code Execution Vulnerability,"A remote code execution vulnerability exists in the Windows IP Routing Management Snapin component. This vulnerability can be exploited by an attacker to execute arbitrary code on the affected system, posing significant risks to data integrity and system security. The issue arises due to insufficient validation of input parameters processed by the snap-in. Systems running unpatched versions of Windows may be susceptible to unauthorized access and various attacks, thus requiring immediate attention to security updates.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49126,https://securityvulnerability.io/vulnerability/CVE-2024-49126,Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability,"The Windows Local Security Authority Subsystem Service (LSASS) is a crucial component responsible for enforcing security policies on Windows systems. A vulnerability has been identified that may allow an attacker to execute arbitrary code remotely. This exploitation can lead to unauthorized access, data breaches, and elevation of privileges. Ensuring that systems are updated and patched against this vulnerability is essential for maintaining security and integrity within an IT environment.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49088,https://securityvulnerability.io/vulnerability/CVE-2024-49088,Windows Common Log File System Driver Elevation of Privilege Vulnerability,"The Windows Common Log File System Driver is affected by a vulnerability that enables an elevation of privilege for attackers. This flaw allows unauthorized users to gain elevated access rights, potentially leading to further exploitation of the affected system. Users and administrators are advised to apply security updates promptly to mitigate the risk associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Windows Server 2025,Windows Server 2025 (server Core Installation)",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49089,https://securityvulnerability.io/vulnerability/CVE-2024-49089,Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability,"The Windows Routing and Remote Access Service (RRAS) poses a remote code execution risk that can be exploited by attackers to execute arbitrary code on affected systems. This vulnerability arises from improper handling of requests, which allows an attacker with network access to potentially take control of the system. Proper software updates and patches are critical to mitigate this risk. Administrators are advised to review the vendor advisory and apply necessary updates to ensure the security of their network infrastructure.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.2,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49112,https://securityvulnerability.io/vulnerability/CVE-2024-49112,Remote Code Execution Vulnerability in Windows Lightweight Directory Access Protocol,"A vulnerability exists within the Windows Lightweight Directory Access Protocol (LDAP), which allows for the execution of remote code. This flaw could enable an attacker to send specially crafted requests to the LDAP server, leading to potential unauthorized access and manipulation of system resources. Organizations utilizing affected versions of Windows should prioritize patching to mitigate the risk associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",9.8,CRITICAL,0.000910000002477318,false,false,false,true,true,true,true,2024-12-12T02:04:00.000Z,22597 CVE-2024-49096,https://securityvulnerability.io/vulnerability/CVE-2024-49096,Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability,"The vulnerability in Microsoft Message Queuing (MSMQ) allows an attacker to exploit a Denial of Service condition, potentially causing the service to become unresponsive. This may lead to significant disruptions for users relying on MSMQ for message-based communication services. It is critical to assess the impact on operations and implement the necessary patches and mitigations as advised by Microsoft to secure your messaging framework. Continuous monitoring and ensuring proper configuration are key in mitigating risks associated with this and similar vulnerabilities.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.5,HIGH,0.0004600000102072954,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-43449,https://securityvulnerability.io/vulnerability/CVE-2024-43449,Windows USB Video Class System Driver Elevation of Privilege Vulnerability,Windows USB Video Class System Driver Elevation of Privilege Vulnerability,Microsoft,"Windows Server 2025,Windows Server 2025 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",6.8,MEDIUM,0.0005099999834783375,false,false,false,false,,false,false,2024-11-12T18:15:00.000Z,0 CVE-2024-43622,https://securityvulnerability.io/vulnerability/CVE-2024-43622,Windows Telephony Service Remote Code Execution Vulnerability,"The Windows Telephony Service is susceptible to a remote code execution vulnerability that could allow an attacker to execute arbitrary code on a vulnerable system. This vulnerability exists in the way that the Windows Telephony Service handles objects in memory. An attacker who successfully exploits this vulnerability can gain elevated privileges, enabling them to execute harmful commands and access sensitive information. Users are encouraged to apply the latest security updates to mitigate potential risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Windows Server 2025,Windows Server 2025 (server Core Installation)",8.8,HIGH,0.0010600000387057662,false,false,false,false,,false,false,2024-11-12T18:15:00.000Z,0 CVE-2024-43634,https://securityvulnerability.io/vulnerability/CVE-2024-43634,Windows USB Video Class System Driver Elevation of Privilege Vulnerability,Windows USB Video Class System Driver Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Windows Server 2025,Windows Server 2025 (server Core Installation)",6.8,MEDIUM,0.0005099999834783375,false,false,false,false,,false,false,2024-11-12T18:15:00.000Z,0