Total
1244 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-21432 | 1 Microsoft | 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more | 2024-12-31 | 7 High |
Windows Update Stack Elevation of Privilege Vulnerability | ||||
CVE-2024-26199 | 1 Microsoft | 1 365 Apps | 2024-12-31 | 7.8 High |
Microsoft Office Elevation of Privilege Vulnerability | ||||
CVE-2024-35254 | 1 Microsoft | 1 Azure Monitor Agent | 2024-12-31 | 7.1 High |
Azure Monitor Agent Elevation of Privilege Vulnerability | ||||
CVE-2024-35253 | 1 Microsoft | 1 Azure File Sync | 2024-12-31 | 4.4 Medium |
Microsoft Azure File Sync Elevation of Privilege Vulnerability | ||||
CVE-2024-30104 | 1 Microsoft | 2 365 Apps, Office | 2024-12-31 | 7.8 High |
Microsoft Office Remote Code Execution Vulnerability | ||||
CVE-2024-30093 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2024-12-31 | 7.3 High |
Windows Storage Elevation of Privilege Vulnerability | ||||
CVE-2024-30065 | 1 Microsoft | 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more | 2024-12-31 | 5.5 Medium |
Windows Themes Denial of Service Vulnerability | ||||
CVE-2024-30076 | 1 Microsoft | 11 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 8 more | 2024-12-31 | 6.8 Medium |
Windows Container Manager Service Elevation of Privilege Vulnerability | ||||
CVE-2024-52050 | 1 Trendmicro | 2 Apexone Op, Apexone Saas | 2024-12-31 | 7.8 High |
A LogServer arbitrary file creation vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | ||||
CVE-2024-28907 | 1 Microsoft | 1 Windows Server 2022 23h2 | 2024-12-31 | 7.8 High |
Microsoft Brokering File System Elevation of Privilege Vulnerability | ||||
CVE-2024-26158 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2024-12-31 | 7.8 High |
Microsoft Install Service Elevation of Privilege Vulnerability | ||||
CVE-2024-12754 | 2024-12-31 | N/A | ||
AnyDesk Link Following Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of AnyDesk. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of background images. By creating a junction, an attacker can abuse the service to read arbitrary files. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-23940. | ||||
CVE-2024-26238 | 2024-12-31 | 7.8 High | ||
Microsoft PLUGScheduler Scheduled Task Elevation of Privilege Vulnerability | ||||
CVE-2024-30060 | 2024-12-31 | 7.8 High | ||
Azure Monitor Agent Elevation of Privilege Vulnerability | ||||
CVE-2024-21397 | 1 Microsoft | 1 Azure File Sync | 2024-12-31 | 5.3 Medium |
Microsoft Azure File Sync Elevation of Privilege Vulnerability | ||||
CVE-2024-21329 | 1 Microsoft | 1 Azure Connected Machine Agent | 2024-12-31 | 7.3 High |
Azure Connected Machine Agent Elevation of Privilege Vulnerability | ||||
CVE-2024-20656 | 1 Microsoft | 4 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 1 more | 2024-12-31 | 7.8 High |
Visual Studio Elevation of Privilege Vulnerability | ||||
CVE-2024-45770 | 1 Redhat | 5 Enterprise Linux, Rhel Aus, Rhel E4s and 2 more | 2024-12-26 | 4.4 Medium |
A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges. | ||||
CVE-2024-7234 | 1 Avg | 2 Anti-virus, Antivirus | 2024-12-19 | 7.8 High |
AVG AntiVirus Free AVGSvc Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of AVG AntiVirus Free. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the AVG Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22260. | ||||
CVE-2024-7235 | 1 Avg | 1 Antivirus | 2024-12-19 | 5.5 Medium |
AVG AntiVirus Free Link Following Denial-of-Service Vulnerability. This vulnerability allows local attackers to create a denial-of-service condition on affected installations of AVG AntiVirus Free. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the AVG Service. By creating a symbolic link, an attacker can abuse the service to create a folder. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. . Was ZDI-CAN-22803. |