2024-09-10
|
CVE-2024-38259
|
Microsoft Management Console Remote Code Execution Vulnerability
|
Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2022, Windows_server_2022_23h2
|
8.8
|
|
|
2024-09-17
|
CVE-2024-37985
|
Windows Kernel Information Disclosure Vulnerability
|
Windows_11_22h2, Windows_11_23h2
|
5.6
|
|
|
2024-09-10
|
CVE-2024-30073
|
Windows Security Zone Mapping Security Feature Bypass Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
7.8
|
|
|
2024-09-10
|
CVE-2024-21416
|
Windows TCP/IP Remote Code Execution Vulnerability
|
Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
9.8
|
|
|
2024-09-10
|
CVE-2024-38045
|
Windows TCP/IP Remote Code Execution Vulnerability
|
Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
8.1
|
|
|
2024-09-10
|
CVE-2024-38046
|
PowerShell Elevation of Privilege Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h1, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
7.8
|
|
|
2024-09-10
|
CVE-2024-43495
|
Windows libarchive Remote Code Execution Vulnerability
|
Windows_11_22h2, Windows_11_23h2, Windows_server_2022_23h2
|
7.3
|
|
|
2024-08-08
|
CVE-2024-21302
|
Summary:
Microsoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS), including a subset of Azure Virtual Machine SKUS. This vulnerability enables an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and...
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
6.7
|
|
|
2024-09-10
|
CVE-2024-38119
|
Windows Network Address Translation (NAT) Remote Code Execution Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h1, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
7.5
|
|
|
2024-09-10
|
CVE-2024-38234
|
Windows Networking Denial of Service Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
6.5
|
|
|