Filtered by NVD-CWE-noinfo
Total 32233 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-30086 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-07-16 7.8 High
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-30085 1 Microsoft 9 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 6 more 2025-07-16 7.8 High
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2024-30083 1 Microsoft 4 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 1 more 2025-07-16 7.5 High
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVE-2024-30067 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-07-16 5.5 Medium
Winlogon Elevation of Privilege Vulnerability
CVE-2024-30066 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-07-16 5.5 Medium
Winlogon Elevation of Privilege Vulnerability
CVE-2024-30065 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-07-16 5.5 Medium
Windows Themes Denial of Service Vulnerability
CVE-2024-30064 1 Microsoft 2 Windows Server 2022, Windows Server 2022 23h2 2025-07-16 8.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-30063 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-07-16 6.7 Medium
Windows Distributed File System (DFS) Remote Code Execution Vulnerability
CVE-2024-30062 1 Microsoft 4 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 1 more 2025-07-16 7.8 High
Windows Standards-Based Storage Management Service Remote Code Execution Vulnerability
CVE-2024-38082 1 Microsoft 1 Edge 2025-07-16 4.7 Medium
Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2024-38093 1 Microsoft 1 Edge 2025-07-16 4.3 Medium
Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2024-30082 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-07-16 7.8 High
Win32k Elevation of Privilege Vulnerability
CVE-2024-30078 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-07-16 8.8 High
Windows Wi-Fi Driver Remote Code Execution Vulnerability
CVE-2024-30077 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-07-16 8 High
Windows OLE Remote Code Execution Vulnerability
CVE-2024-30076 1 Microsoft 11 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 8 more 2025-07-16 6.8 Medium
Windows Container Manager Service Elevation of Privilege Vulnerability
CVE-2024-30075 1 Microsoft 1 Windows Server 2008 2025-07-16 8 High
Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability
CVE-2024-30074 1 Microsoft 1 Windows Server 2008 2025-07-16 8 High
Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability
CVE-2024-30072 1 Microsoft 3 Windows 11 22h2, Windows 11 23h2, Windows Server 2022 23h2 2025-07-16 7.8 High
Microsoft Event Trace Log File Parsing Remote Code Execution Vulnerability
CVE-2024-30070 1 Microsoft 3 Windows Server 2012, Windows Server 2016, Windows Server 2019 2025-07-16 7.5 High
DHCP Server Service Denial of Service Vulnerability
CVE-2025-31672 2 Apache, Netapp 2 Poi, Active Iq Unified Manager 2025-07-15 5.3 Medium
Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry. This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file. Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely.