Total
                    1290 CVE
                
            | CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 | 
|---|---|---|---|---|---|
| CVE-2024-49013 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-49015 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-49017 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-49006 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-49007 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-49008 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-49009 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-49010 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-49001 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-49002 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-49004 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-49005 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-49000 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-48999 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-48998 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-48997 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-48996 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-48995 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-48994 | 1 Microsoft | 3 Sql Server 2016, Sql Server 2017, Sql Server 2019 | 2024-11-15 | N/A | 8.8 HIGH | 
| SQL Server Native Client Remote Code Execution Vulnerability | |||||
| CVE-2024-47450 | 3 Adobe, Apple, Microsoft | 3 Illustrator, Macos, Windows | 2024-11-14 | N/A | 7.8 HIGH | 
| Illustrator versions 28.7.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
