Export limit exceeded: 343793 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (10101 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-14097 1 Radiometer 5 Abl800 Basic Analyzer, Abl800 Flex Analyzer, Abl90 Flex Analyzer and 2 more 2025-12-18 7.2 High
A vulnerability in the application software of multiple Radiometer products may allow remote code execution and unauthorized device management when specific internal conditions are met. Exploitation requires that a remote connection is established with additional information obtained through other means. The issue is caused by a weakness in the analyzer’s application software.                                                                                                                                                                                                Other related CVE's are CVE-2025-14095 & CVE-2025-14096.                                                                                                      Affected customers have been informed about this vulnerability. This CVE is being published to provide transparency. Required Configuration for Exposure: Affected application software version is in use and remote support feature is enabled in the analyzer.                                                                                                                                                                        Temporary work Around: If the network is not considered secure, please remove the analyzer from the network.                         Permanent solution: Customers should ensure the following: • The network is secure, and access follows best practices. Local Radiometer representatives will contact all affected customers to discuss a permanent solution.                                                      Exploit Status: Researchers have provided working proof-of-concept (PoC). Radiometer is not aware of any publicly available exploits at the time of this publication.
CVE-2024-30052 1 Microsoft 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 2025-12-17 4.7 Medium
Visual Studio Remote Code Execution Vulnerability
CVE-2024-35249 1 Microsoft 3 Dynamics 365 Business Central, Dynamics 365 Business Central 2023, Dynamics 365 Business Central 2024 2025-12-17 8.8 High
Microsoft Dynamics 365 Business Central Remote Code Execution Vulnerability
CVE-2024-30104 1 Microsoft 5 365 Apps, Office, Office 2016 and 2 more 2025-12-17 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2024-30103 1 Microsoft 6 365 Apps, Office, Office 2019 and 3 more 2025-12-17 8.8 High
Microsoft Outlook Remote Code Execution Vulnerability
CVE-2024-30102 1 Microsoft 1 365 Apps 2025-12-17 7.3 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2024-30101 1 Microsoft 5 365 Apps, Office, Office 2016 and 2 more 2025-12-17 7.5 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2024-30100 1 Microsoft 3 Sharepoint Server, Sharepoint Server 2016, Sharepoint Server 2019 2025-12-17 7.8 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-30097 1 Microsoft 18 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 15 more 2025-12-17 8.8 High
Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability
CVE-2024-30095 1 Microsoft 23 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 20 more 2025-12-17 7.8 High
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-30094 1 Microsoft 23 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 20 more 2025-12-17 7.8 High
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-30063 1 Microsoft 23 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 20 more 2025-12-17 6.7 Medium
Windows Distributed File System (DFS) Remote Code Execution Vulnerability
CVE-2024-30062 1 Microsoft 5 Windows Server 2012, Windows Server 2012 R2, Windows Server 2016 and 2 more 2025-12-17 7.8 High
Windows Standards-Based Storage Management Service Remote Code Execution Vulnerability
CVE-2024-30080 1 Microsoft 22 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 19 more 2025-12-17 9.8 Critical
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2024-30078 1 Microsoft 23 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 20 more 2025-12-17 8.8 High
Windows Wi-Fi Driver Remote Code Execution Vulnerability
CVE-2024-30077 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2025-12-17 8 High
Windows OLE Remote Code Execution Vulnerability
CVE-2024-30075 1 Microsoft 3 Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 Sp2 2025-12-17 8 High
Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability
CVE-2024-30074 1 Microsoft 3 Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 Sp2 2025-12-17 8 High
Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability
CVE-2024-30072 1 Microsoft 6 Windows 11 22h2, Windows 11 22h2, Windows 11 23h2 and 3 more 2025-12-17 7.8 High
Microsoft Event Trace Log File Parsing Remote Code Execution Vulnerability
CVE-2024-29027 2 Parse Community, Parseplatform 2 Parse Server, Parse-server 2025-12-17 9.1 Critical
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 6.5.5 and 7.0.0-alpha.29, calling an invalid Parse Server Cloud Function name or Cloud Job name crashes the server and may allow for code injection, internal store manipulation or remote code execution. The patch in versions 6.5.5 and 7.0.0-alpha.29 added string sanitation for Cloud Function name and Cloud Job name. As a workaround, sanitize the Cloud Function name and Cloud Job name before it reaches Parse Server.