cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-49102,https://securityvulnerability.io/vulnerability/CVE-2024-49102,Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability,"The vulnerability in the Windows Routing and Remote Access Service (RRAS) poses a significant risk, allowing attackers to execute arbitrary code on vulnerable systems. When exploited, this security flaw can enable unauthorized access to sensitive data and application environments. This vulnerability affects multiple versions of Windows Server and client operating systems, emphasizing the need for organizations to quickly assess their exposure and apply recommended security measures. It is essential for IT administrators to stay updated on patches and mitigation strategies to bolster their security posture against potential attacks leveraging this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49116,https://securityvulnerability.io/vulnerability/CVE-2024-49116,Windows Remote Desktop Services Remote Code Execution Vulnerability,"A significant vulnerability within Windows Remote Desktop Services has been identified, allowing attackers to execute arbitrary code remotely. Systems using the affected versions of Remote Desktop Services may be exploited by sending specially crafted requests to the target system. This vulnerability underscores the need for administrators to apply security updates promptly to mitigate potential intrusions and safeguard sensitive data.",Microsoft,"Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows Server 2025 (server Core Installation),Windows Server 2022, 23h2 Edition (server Core Installation),Windows Server 2025,Windows Server 2016,Windows Server 2016 (server Core Installation)",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49084,https://securityvulnerability.io/vulnerability/CVE-2024-49084,Windows Kernel Elevation of Privilege Vulnerability,"A vulnerability exists within the Windows Kernel, allowing an attacker to execute arbitrary code with elevated privileges. This flaw can be exploited by sending specially crafted requests to the affected system, becoming a serious concern for users who rely on Windows operating systems. Remediation measures should be promptly implemented to mitigate the potential risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49096,https://securityvulnerability.io/vulnerability/CVE-2024-49096,Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability,"The vulnerability in Microsoft Message Queuing (MSMQ) allows an attacker to exploit a Denial of Service condition, potentially causing the service to become unresponsive. This may lead to significant disruptions for users relying on MSMQ for message-based communication services. It is critical to assess the impact on operations and implement the necessary patches and mitigations as advised by Microsoft to secure your messaging framework. Continuous monitoring and ensuring proper configuration are key in mitigating risks associated with this and similar vulnerabilities.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.5,HIGH,0.0004600000102072954,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49107,https://securityvulnerability.io/vulnerability/CVE-2024-49107,WmsRepair Service Elevation of Privilege Vulnerability,"The WmsRepair Service has a vulnerability that allows an attacker to elevate privileges, potentially enabling them to execute unauthorized actions on the affected system. This flaw poses significant risks, as it could allow malicious users to gain access to higher-level permissions than intended, compromising the integrity and confidentiality of sensitive data. It is essential for users and organizations utilizing this service to address this vulnerability promptly through available patches and updates to safeguard against possible exploitation.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation)",7.3,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49115,https://securityvulnerability.io/vulnerability/CVE-2024-49115,Windows Remote Desktop Services Remote Code Execution Vulnerability,A vulnerability in Windows Remote Desktop Services allows remote code execution if an attacker connects to the target system using RDP and sends specially crafted requests. This could enable unauthorized actions on affected systems and compromise sensitive data. Systems utilizing remote desktop protocols must implement the necessary security measures to mitigate this risk and protect against potential exploitation.,Microsoft,"Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows Server 2025 (server Core Installation),Windows Server 2022, 23h2 Edition (server Core Installation),Windows Server 2025,Windows Server 2016,Windows Server 2016 (server Core Installation)",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49079,https://securityvulnerability.io/vulnerability/CVE-2024-49079,Input Method Editor (IME) Remote Code Execution Vulnerability,"A security vulnerability exists within the Input Method Editor (IME) that could allow an attacker to execute arbitrary code remotely. The flaw can be exploited if an affected version interacts with maliciously crafted input, leading to unauthorized access and potential data compromise. Users are urged to apply the latest security updates provided by Microsoft to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49082,https://securityvulnerability.io/vulnerability/CVE-2024-49082,Windows File Explorer Information Disclosure Vulnerability,Windows File Explorer Information Disclosure Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",6.8,MEDIUM,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49088,https://securityvulnerability.io/vulnerability/CVE-2024-49088,Windows Common Log File System Driver Elevation of Privilege Vulnerability,"The Windows Common Log File System Driver is affected by a vulnerability that enables an elevation of privilege for attackers. This flaw allows unauthorized users to gain elevated access rights, potentially leading to further exploitation of the affected system. Users and administrators are advised to apply security updates promptly to mitigate the risk associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Windows Server 2025,Windows Server 2025 (server Core Installation)",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49091,https://securityvulnerability.io/vulnerability/CVE-2024-49091,Windows Domain Name Service Remote Code Execution Vulnerability,"The vulnerability in the Windows Domain Name Service allows remote code execution, potentially enabling an attacker to take control of an affected system. Exploitation of this vulnerability can occur when the DNS service fails to properly handle requests, leading to unauthorized actions carried out on the system. This risk emphasizes the importance of regular updates and security monitoring to safeguard network infrastructure.",Microsoft,"Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows Server 2025 (server Core Installation),Windows Server 2022, 23h2 Edition (server Core Installation),Windows Server 2025,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.2,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49105,https://securityvulnerability.io/vulnerability/CVE-2024-49105,Remote Desktop Client Remote Code Execution Vulnerability,"This vulnerability in the Microsoft Remote Desktop Client allows attackers to execute arbitrary code remotely on the affected systems. When exploited, it could enable an unauthorized user to gain control over the system, posing a severe risk to the integrity and confidentiality of user data. Users of the Remote Desktop Client are strongly advised to apply any available security updates and take precautions to secure their environments against potential exploitation.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Remote Desktop Client For Windows Desktop,Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Windows App Client For Windows Desktop",8.4,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49106,https://securityvulnerability.io/vulnerability/CVE-2024-49106,Remote Code Execution Vulnerability Affects Windows Remote Desktop Services,"The vulnerability in Windows Remote Desktop Services allows an attacker to execute arbitrary code on the affected system by sending specially crafted requests. This enhances the risk of unauthorized access and control over systems, potentially leading to data breaches and other malicious activities. Organizations using Windows Server and desktop versions are urged to apply the recommended security updates to mitigate risks associated with this vulnerability.",Microsoft,"Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows Server 2025 (server Core Installation),Windows Server 2022, 23h2 Edition (server Core Installation),Windows Server 2025,Windows Server 2016,Windows Server 2016 (server Core Installation)",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49128,https://securityvulnerability.io/vulnerability/CVE-2024-49128,Windows Remote Desktop Services Remote Code Execution Vulnerability,"A vulnerability exists in Windows Remote Desktop Services that enables an attacker to execute arbitrary code on the target system. Exploitation of this vulnerability may allow unauthorized users to gain control over affected systems, potentially leading to data breaches or significant disruptions. The vulnerability affects multiple Windows versions, emphasizing the need for organizations to apply available security updates promptly. Ensuring that Remote Desktop Services is properly configured can help mitigate risks associated with this security flaw.",Microsoft,"Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows Server 2025 (server Core Installation),Windows Server 2022, 23h2 Edition (server Core Installation),Windows Server 2025,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,128 CVE-2024-49108,https://securityvulnerability.io/vulnerability/CVE-2024-49108,Windows Remote Desktop Services Remote Code Execution Vulnerability,"The vulnerability within Windows Remote Desktop Services allows remote code execution, posing significant risks to affected systems. Exploitation of this vulnerability can enable attackers to run arbitrary code on the target server, potentially leading to unauthorized access or data breaches. Proper mitigation strategies should be employed to protect against unauthorized remote access and to secure the integrity of affected systems.",Microsoft,"Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows Server 2025 (server Core Installation),Windows Server 2022, 23h2 Edition (server Core Installation),Windows Server 2025,Windows Server 2016,Windows Server 2016 (server Core Installation)",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49126,https://securityvulnerability.io/vulnerability/CVE-2024-49126,Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability,"The Windows Local Security Authority Subsystem Service (LSASS) is a crucial component responsible for enforcing security policies on Windows systems. A vulnerability has been identified that may allow an attacker to execute arbitrary code remotely. This exploitation can lead to unauthorized access, data breaches, and elevation of privileges. Ensuring that systems are updated and patched against this vulnerability is essential for maintaining security and integrity within an IT environment.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49072,https://securityvulnerability.io/vulnerability/CVE-2024-49072,Windows Task Scheduler Elevation of Privilege Vulnerability,"A vulnerability exists in the Windows Task Scheduler that could allow an attacker to elevate privileges on affected systems. This issue arises when the Windows Task Scheduler improperly handles requests, giving malicious actors the opportunity to execute arbitrary code with elevated permissions. Exploitation of this vulnerability could lead to further compromises within the system's environment, emphasizing the importance of applying security updates to mitigate risks associated with unauthorized access. Users are encouraged to adhere to best practices for maintaining system security and regularly check for updates.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49080,https://securityvulnerability.io/vulnerability/CVE-2024-49080,Windows IP Routing Management Snapin Remote Code Execution Vulnerability,"A remote code execution vulnerability exists in the Windows IP Routing Management Snapin component. This vulnerability can be exploited by an attacker to execute arbitrary code on the affected system, posing significant risks to data integrity and system security. The issue arises due to insufficient validation of input parameters processed by the snap-in. Systems running unpatched versions of Windows may be susceptible to unauthorized access and various attacks, thus requiring immediate attention to security updates.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49113,https://securityvulnerability.io/vulnerability/CVE-2024-49113,Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability,"The Windows Lightweight Directory Access Protocol (LDAP) Denial of Service vulnerability can cause significant disruptions in the availability of directory services. This issue arises from insufficient handling of certain types of LDAP requests, leading to scenarios where a targeted denial of service attack may disrupt normal operations. Organizations utilizing affected versions of Windows Server and Windows operating systems should be aware of the potential impact on their directory services operations and consider implementing recommended security updates to mitigate risks.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.5,HIGH,0.0004600000102072954,false,false,false,false,,true,false,2024-12-12T02:04:00.000Z,4124 CVE-2024-49085,https://securityvulnerability.io/vulnerability/CVE-2024-49085,Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability,"The vulnerability in Windows Routing and Remote Access Service (RRAS) allows an attacker to execute arbitrary code on the affected system. This issue arises when the RRAS does not properly handle certain requests, potentially enabling a remote attacker to compromise the system through specially crafted network packets. Exploiting this vulnerability could lead to unauthorized access and control over the affected systems, emphasizing the need for organizations to apply available updates and ensure their network services are secure.",Microsoft,"Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows Server 2025 (server Core Installation),Windows Server 2022, 23h2 Edition (server Core Installation),Windows Server 2025,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49086,https://securityvulnerability.io/vulnerability/CVE-2024-49086,Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability,"A vulnerability has been identified in the Windows Routing and Remote Access Service (RRAS) that allows for remote code execution. This occurs when RRAS improperly handles requests. An attacker who successfully exploits this vulnerability could execute arbitrary code on the target system, potentially gaining access to sensitive information, altering system configurations, and leading to further attacks within the environment. Mitigation strategies are essential to protect systems from potential exploitation.",Microsoft,"Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows Server 2025 (server Core Installation),Windows Server 2022, 23h2 Edition (server Core Installation),Windows Server 2025,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49089,https://securityvulnerability.io/vulnerability/CVE-2024-49089,Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability,"The Windows Routing and Remote Access Service (RRAS) poses a remote code execution risk that can be exploited by attackers to execute arbitrary code on affected systems. This vulnerability arises from improper handling of requests, which allows an attacker with network access to potentially take control of the system. Proper software updates and patches are critical to mitigate this risk. Administrators are advised to review the vendor advisory and apply necessary updates to ensure the security of their network infrastructure.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.2,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49090,https://securityvulnerability.io/vulnerability/CVE-2024-49090,Windows Common Log File System Driver Elevation of Privilege Vulnerability,"The Windows Common Log File System Driver features a vulnerability that could enable an attacker to elevate their privileges on an affected system. By exploiting this flaw, unauthorized users may gain access to restricted areas of the system, potentially leading to unauthorized actions or access to sensitive data. This issue highlights the importance of maintaining system updates and implementing proactive security measures to mitigate risks associated with privilege escalation vulnerabilities.",Microsoft,"Windows Server 2025,Windows Server 2025 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49112,https://securityvulnerability.io/vulnerability/CVE-2024-49112,Remote Code Execution Vulnerability in Windows Lightweight Directory Access Protocol,"A vulnerability exists within the Windows Lightweight Directory Access Protocol (LDAP), which allows for the execution of remote code. This flaw could enable an attacker to send specially crafted requests to the LDAP server, leading to potential unauthorized access and manipulation of system resources. Organizations utilizing affected versions of Windows should prioritize patching to mitigate the risk associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",9.8,CRITICAL,0.000910000002477318,false,false,false,true,true,true,true,2024-12-12T02:04:00.000Z,22597 CVE-2024-49104,https://securityvulnerability.io/vulnerability/CVE-2024-49104,Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability,"The vulnerability in Windows Routing and Remote Access Service (RRAS) can allow an attacker to execute arbitrary code on the affected system. This occurs when a specially crafted packet is sent to the server, potentially leading to unauthorized access and control. Organizations using the affected versions should apply security mitigations and patches as soon as they become available to protect against possible exploitation.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0 CVE-2024-49118,https://securityvulnerability.io/vulnerability/CVE-2024-49118,Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability,A remote code execution vulnerability exists in Microsoft Message Queuing (MSMQ) when the software fails to properly handle objects in memory. This can allow an attacker to execute arbitrary code in the context of the target user. Exploitation of this vulnerability requires that a user open a specially crafted message. Microsoft has issued an advisory detailing the issue and recommends applying security updates to mitigate potential risks.,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.1,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-12-12T02:04:00.000Z,0