CVE-2024-43451 – Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability
https://notcve.org/view.php?id=CVE-2024-43451
NTLM Hash Disclosure Spoofing Vulnerability Microsoft Windows contains an NTLMv2 hash spoofing vulnerability that could result in disclosing a user's NTLMv2 hash to an attacker via a file open operation. The attacker could then leverage this hash to impersonate that user. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43451 • CWE-73: External Control of File Name or Path •
CVE-2024-43450 – Windows DNS Spoofing Vulnerability
https://notcve.org/view.php?id=CVE-2024-43450
Windows DNS Spoofing Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43450 • CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel •
CVE-2024-43449 – Windows USB Video Class System Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-43449
Windows USB Video Class System Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43449 • CWE-125: Out-of-bounds Read •
CVE-2024-43646 – Windows Secure Kernel Mode Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-43646
Windows Secure Kernel Mode Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43646 • CWE-822: Untrusted Pointer Dereference •
CVE-2024-43645 – Windows Defender Application Control (WDAC) Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-43645
Windows Defender Application Control (WDAC) Security Feature Bypass Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43645 • CWE-693: Protection Mechanism Failure •