Vulnerabilities (CVE)

Filtered by NVD-CWE-noinfo
Total 31934 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-29368 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-04-08 N/A 7.0 HIGH
Windows Filtering Platform Elevation of Privilege Vulnerability
CVE-2023-29365 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-04-08 N/A 7.8 HIGH
Windows Media Remote Code Execution Vulnerability
CVE-2023-29371 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-04-08 N/A 7.8 HIGH
Windows GDI Elevation of Privilege Vulnerability
CVE-2023-29372 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-04-08 N/A 8.8 HIGH
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2023-29373 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-04-08 N/A 8.8 HIGH
Microsoft ODBC Driver Remote Code Execution Vulnerability
CVE-2023-32008 1 Microsoft 10 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 7 more 2025-04-08 N/A 7.8 HIGH
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVE-2023-32011 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-04-08 N/A 7.5 HIGH
Windows iSCSI Discovery Service Denial of Service Vulnerability
CVE-2023-32014 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-04-08 N/A 9.8 CRITICAL
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVE-2022-39184 1 Exfo 2 Bv-10, Bv-10 Firmware 2025-04-08 N/A 9.8 CRITICAL
EXFO - BV-10 Performance Endpoint Unit authentication bypass User can manually manipulate access enabling authentication bypass.
CVE-2022-4365 1 Gitlab 1 Gitlab 2025-04-08 N/A 4.3 MEDIUM
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A malicious Maintainer can leak the sentry token by changing the configured URL in the Sentry error tracking settings page.
CVE-2022-39182 1 Mingham-smith 1 Tardis 2000 2025-04-08 N/A 8.8 HIGH
H C Mingham-Smith Ltd - Tardis 2000 Privilege escalation.Version 1.6 is vulnerable to privilege escalation which may allow a malicious actor to gain system privileges.
CVE-2023-24938 1 Microsoft 7 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 4 more 2025-04-08 N/A 6.5 MEDIUM
Windows CryptoAPI Denial of Service Vulnerability
CVE-2023-24937 1 Microsoft 7 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 4 more 2025-04-08 N/A 6.5 MEDIUM
Windows CryptoAPI Denial of Service Vulnerability
CVE-2023-29346 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-04-08 N/A 7.8 HIGH
NTFS Elevation of Privilege Vulnerability
CVE-2023-29351 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-04-08 N/A 8.1 HIGH
Windows Group Policy Elevation of Privilege Vulnerability
CVE-2023-29358 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-04-08 N/A 7.8 HIGH
Windows GDI Elevation of Privilege Vulnerability
CVE-2023-29359 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-04-08 N/A 7.8 HIGH
GDI Elevation of Privilege Vulnerability
CVE-2023-29361 1 Microsoft 5 Windows 10 21h2, Windows 10 22h2, Windows 11 21h2 and 2 more 2025-04-08 N/A 7.0 HIGH
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2023-29363 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-04-08 N/A 9.8 CRITICAL
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVE-2025-2993 1 Tenda 2 Fh1202, Fh1202 Firmware 2025-04-08 N/A 5.3 MEDIUM
A vulnerability, which was classified as critical, has been found in Tenda FH1202 1.2.0.14(408). Affected by this issue is some unknown functionality of the file /default.cfg. The manipulation of the argument these leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.