2024-09-10
|
CVE-2024-38252
|
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
|
Windows_10_1607, Windows_10_1809, Windows_10_21h1, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
7.8
|
|
|
2024-09-10
|
CVE-2024-38253
|
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
|
Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2022_23h2
|
7.8
|
|
|
2024-09-10
|
CVE-2024-38254
|
Windows Authentication Information Disclosure Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h1, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
6.2
|
|
|
2024-09-10
|
CVE-2024-38259
|
Microsoft Management Console Remote Code Execution Vulnerability
|
Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2022, Windows_server_2022_23h2
|
8.8
|
|
|
2024-08-08
|
CVE-2024-21302
|
Summary:
Microsoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS), including a subset of Azure Virtual Machine SKUS. This vulnerability enables an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and...
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
6.7
|
|
|
2024-09-10
|
CVE-2024-38217
|
Windows Mark of the Web Security Feature Bypass Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
5.4
|
|
|
2024-09-10
|
CVE-2024-38014
|
Windows Installer Elevation of Privilege Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
7.8
|
|
|
2024-08-13
|
CVE-2024-38063
|
Windows TCP/IP Remote Code Execution Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
9.8
|
|
|
2024-08-13
|
CVE-2024-38114
|
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
8.8
|
|
|
2024-08-13
|
CVE-2024-38143
|
Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2
|
4.2
|
|
|