Latest warnings
| CVE-2024-43498 |
.NET and Visual Studio Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Critical |
| CVE-2024-4323 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Critical |
| CVE-2024-45159 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Critical |
| CVE-2024-30166 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Critical |
| CVE-2024-43602 |
Azure CycleCloud Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Critical |
| CVE-2024-52533 |
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
|
MSRC | 2026‑02‑21 | Critical |
| CVE-2024-30896 |
InfluxDB OSS 2.x through 2.7.11 stores the administrative operator token under the default organization which allows authorized users with read access to the authorization resource of the default organization to retrieve the operator token. InfluxDB OSS 1.x, Enterprise, Cloud, Cloud Dedicated and Clustered are not affected. NOTE: The researcher states that InfluxDB allows allAccess administrators to retrieve all raw tokens via an "influx auth ls" command. The supplier indicates that the organizations feature is operating as intended and that users may choose to add users to non-default organizations. A future release of InfluxDB 2.x will remove the ability to retrieve tokens from the API.
|
MSRC | 2026‑02‑21 | Critical |
| CVE-2024-49038 |
Microsoft Copilot Studio Elevation Of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Critical |
| CVE-2024-43639 |
Windows KDC Proxy Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Critical |
| CVE-2024-49039 |
Microsoft Windows Task Scheduler Privilege Escalation Vulnerability
|
CISA-KEV | 2024‑11‑12 | Critical |
Page 1