Latest warnings
| CVE-2024-43499 |
.NET and Visual Studio Denial of Service Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-2410 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-34088 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-23775 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | High |
| CVE-2023-43615 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | High |
| CVE-2023-52353 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | High |
| CVE-2023-5363 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | High |
| CVE-2023-38709 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | High |
| CVE-2023-39325 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-30202 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | High |
| CVE-2020-28458 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-23744 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-28960 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-49019 |
Active Directory Certificate Services Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-49056 |
Airlift.microsoft.com Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50275 |
arm64/sve: Discard stale CPU state when handling SVE traps
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-49042 |
Azure Database for PostgreSQL Flexible Server Extension Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-43613 |
Azure Database for PostgreSQL Flexible Server Extension Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-49060 |
Azure Stack HCI Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50124 |
Bluetooth: ISO: Fix UAF on iso_sock_timeout
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50125 |
Bluetooth: SCO: Fix UAF on sco_sock_timeout
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-53099 |
bpf: Check validity of link->type in bpf_link_show_fdinfo()
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50164 |
bpf: Fix overloading of MEM_UNINIT's meaning
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50217 |
btrfs: fix use-after-free of block device file in __btrfs_free_extra_devids()
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-11407 |
Denial of Service through Data corruption in gRPC-C++
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50280 |
dm cache: fix flushing uninitialized delayed_work on cache_ctr error
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-53098 |
drm/xe/ufence: Prefetch ufence addr to catch bogus address
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-53068 |
firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier()
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50159 |
firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup()
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50246 |
fs/ntfs3: Add rough attr alloc_size check
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50242 |
fs/ntfs3: Additional check in ntfs_file_release
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50250 |
fsdax: dax_unshare_iter needs to copy entire blocks
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-52530 |
GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-52531 |
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict.
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-52532 |
GNOME libsoup before 3.6.1 has an infinite loop and memory consumption. during the reading of certain patterns of WebSocket data from clients.
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-53920 |
In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50222 |
iov_iter: fix copy_page_from_iter_atomic() if KMAP_LOCAL_FORCE_MAP
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50286 |
ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50283 |
ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-43598 |
LightGBM Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-50261 |
macsec: Fix use-after-free while sending the offloading packet
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-49052 |
Microsoft Azure PolicyWatch Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-49053 |
Microsoft Dynamics 365 Sales Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-49026 |
Microsoft Excel Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-49027 |
Microsoft Excel Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-49028 |
Microsoft Excel Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-49029 |
Microsoft Excel Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-49030 |
Microsoft Excel Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-49040 |
Microsoft Exchange Server Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | High |
| CVE-2024-49031 |
Microsoft Office Graphics Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | High |
Page 1