Neueste Warnungen
| CVE-2024-38095 |
.NET and Visual Studio Denial of Service Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-30105 |
.NET and Visual Studio Denial of Service Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-35264 |
.NET and Visual Studio Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-38081 |
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-5156 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-4911 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-31755 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-33601 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-29160 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-29165 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-32614 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-32613 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-32612 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-32616 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-32618 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-32623 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-2976 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-32487 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2023-5535 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-31744 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2015-7747 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2020-27823 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2020-27814 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2020-8112 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-29158 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-29162 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-29163 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-32605 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-32620 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-32619 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-33877 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-31583 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-29161 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-33873 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2020-15503 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-0760 |
A flood of DNS messages over TCP may make the server unstable
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-41069 |
ASoC: topology: Fix references to freed memory
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-4076 |
Assertion failure when serving both stale cache data and authoritative zone content
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-41087 |
ata: libata-core: Fix double free on error
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-38092 |
Azure CycleCloud Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-35266 |
Azure DevOps Server Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-35267 |
Azure DevOps Server Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-35261 |
Azure Network Watcher VM Extension Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-1737 |
BIND's database will be slow if a very large number of RRs exist at the same name
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-3596 |
CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-38061 |
DCOM Remote Cross-Session Activation Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-24791 |
Denial of service due to improper 100-continue handling in net/http
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-38044 |
DHCP Server Service Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-41092 |
drm/i915/gt: Fix potential UAF by revoke of fence registers
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2024-42160 |
f2fs: check validation of fault attrs in f2fs_build_fault_attr()
|
MSRC | 2026‑02‑21 | Hoch |
Seite 1