Search Results (2885 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-38154 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2025-07-10 8.8 High
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38152 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-07-10 7.8 High
Windows OLE Remote Code Execution Vulnerability
CVE-2024-38142 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-07-10 7.8 High
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVE-2024-38130 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-07-10 8.8 High
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38121 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2025-07-10 8.8 High
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38116 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-07-10 8.8 High
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVE-2024-38115 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-07-10 8.8 High
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVE-2024-38114 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-07-10 8.8 High
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVE-2024-38172 1 Microsoft 2 365 Apps, Office Long Term Servicing Channel 2025-07-10 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2024-38161 1 Microsoft 8 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 5 more 2025-07-10 6.8 Medium
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVE-2024-38160 1 Microsoft 2 Windows 10 1607, Windows Server 2016 2025-07-10 9.1 Critical
Windows Network Virtualization Remote Code Execution Vulnerability
CVE-2024-45993 1 Giflib Project 1 Giflib 2025-07-10 6.5 Medium
Giflib Project v5.2.2 is vulnerable to a heap buffer overflow via gif2rgb.
CVE-2025-53184 1 Huawei 1 Harmonyos 2025-07-09 6.5 Medium
Null pointer dereference vulnerability in the PDF preview module Impact: Successful exploitation of this vulnerability may affect function stability.
CVE-2025-53183 1 Huawei 1 Harmonyos 2025-07-09 6.5 Medium
Null pointer dereference vulnerability in the PDF preview module Impact: Successful exploitation of this vulnerability may affect function stability.
CVE-2025-53182 1 Huawei 1 Harmonyos 2025-07-09 6.5 Medium
Null pointer dereference vulnerability in the PDF preview module Impact: Successful exploitation of this vulnerability may affect function stability.
CVE-2025-53181 1 Huawei 1 Harmonyos 2025-07-09 6.5 Medium
Null pointer dereference vulnerability in the PDF preview module Impact: Successful exploitation of this vulnerability may affect function stability.
CVE-2025-53179 1 Huawei 1 Harmonyos 2025-07-09 6.5 Medium
Null pointer dereference vulnerability in the PDF preview module Impact: Successful exploitation of this vulnerability may affect function stability.
CVE-2025-53180 1 Huawei 1 Harmonyos 2025-07-09 6.5 Medium
Null pointer dereference vulnerability in the PDF preview module Impact: Successful exploitation of this vulnerability may affect function stability.
CVE-2025-20686 2 Mediatek, Openwrt 7 Mt6890, Mt7915, Mt7916 and 4 more 2025-07-09 8.8 High
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00415570; Issue ID: MSV-3404.
CVE-2023-50229 2 Bluez, Redhat 2 Bluez, Enterprise Linux 2025-07-08 8.0 High
BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device. The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20936.