| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-30091 | Win32k Elevation of Privilege Vulnerability | Microsoft | Windows 10 Version 1809 | High | 7.8 | 2024-06-11 16:59:58 | Deep Dive |
| CVE-2024-30090 | Microsoft Streaming Service Elevation of Privilege Vulnerability | Microsoft | Windows 10 Version 1809 | High | 7.0 | 2024-06-11 16:59:57 | Deep Dive |
| CVE-2024-30087 | Win32k Elevation of Privilege Vulnerability | Microsoft | Windows 10 Version 1809 | High | 7.8 | 2024-06-11 16:59:55 | Deep Dive |
| CVE-2024-30084 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | Microsoft | Windows 10 Version 1809 | High | 7.0 | 2024-06-11 16:59:54 | Deep Dive |
| CVE-2024-30063 | Windows Distributed File System (DFS) Remote Code Execution Vulnerability | Microsoft | Windows 10 Version 1809 | Medium | 6.7 | 2024-06-11 16:59:50 | Deep Dive |
| CVE-2024-35250 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | Microsoft | Windows 10 Version 1809 | High | 7.8 | 2024-06-11 16:59:47 | Deep Dive |
| CVE-2024-30080 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | Microsoft | Windows 10 Version 1809 | Critical | 9.8 | 2024-06-11 16:59:46 | Deep Dive |
| CVE-2024-30082 | Win32k Elevation of Privilege Vulnerability | Microsoft | Windows 10 Version 1809 | High | 7.8 | 2024-06-11 16:59:46 | Deep Dive |
| CVE-2024-30078 | Windows Wi-Fi Driver Remote Code Execution Vulnerability | Microsoft | Windows 10 Version 1809 | High | 8.8 | 2024-06-11 16:59:45 | Deep Dive |
| CVE-2024-30077 | Windows OLE Remote Code Execution Vulnerability | Microsoft | Windows 10 Version 1809 | High | 8.0 | 2024-06-11 16:59:44 | Deep Dive |
| CVE-2024-30075 | Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability | Microsoft | Windows Server 2008 Service Pack 2 | High | 8.0 | 2024-06-11 16:59:43 | Deep Dive |
| CVE-2024-30074 | Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability | Microsoft | Windows Server 2008 Service Pack 2 | High | 8.0 | 2024-06-11 16:59:43 | Deep Dive |
| CVE-2024-37289 | Trend Micro Apex One 安全漏洞 | Trend Micro, Inc. | Trend Micro Apex One | High | 7.8 | 2024-06-10 21:22:35 | Deep Dive |
| CVE-2024-36307 | Trend Micro Apex One 安全漏洞 | Trend Micro, Inc. | Trend Micro Apex One | Medium | 4.7 | 2024-06-10 21:21:33 | Deep Dive |
| CVE-2024-36306 | Trend Micro Apex One 安全漏洞 | Trend Micro, Inc. | Trend Micro Apex One | Medium | 6.1 | 2024-06-10 21:21:24 | Deep Dive |
| CVE-2024-36305 | Trend Micro Apex One 安全漏洞 | Trend Micro, Inc. | Trend Micro Apex One | High | 7.8 | 2024-06-10 21:21:15 | Deep Dive |
| CVE-2024-36304 | Trend Micro Apex One 安全漏洞 | Trend Micro, Inc. | Trend Micro Apex One | High | 7.8 | 2024-06-10 21:21:04 | Deep Dive |
| CVE-2024-36303 | Trend Micro Apex One 安全漏洞 | Trend Micro, Inc. | Trend Micro Apex One | High | 7.8 | 2024-06-10 21:20:53 | Deep Dive |
| CVE-2024-36302 | Trend Micro Apex One 安全漏洞 | Trend Micro, Inc. | Trend Micro Apex One | High | 7.8 | 2024-06-10 21:20:42 | Deep Dive |
| CVE-2024-3049 | Booth: specially crafted hash can lead to invalid hmac being accepted by booth server | - | - | Medium | 5.9 | 2024-06-06 05:30:04 | Deep Dive |