CVE-2023-36726 – Windows Internet Key Exchange (IKE) Extension Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-36726
Windows Internet Key Exchange (IKE) Extension Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Windows Internet Key Exchange (IKE) • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36726 • CWE-416: Use After Free •
CVE-2023-36729 – Named Pipe File System Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-36729
Named Pipe File System Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Named Pipe File System • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36729 • CWE-121: Stack-based Buffer Overflow •
CVE-2023-36731 – Win32k Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-36731
Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Win32k This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the BLTRECORD::bStretch function in the win32kfull driver. The issue results from the lack of proper validation of user-supplied bitmaps prior to processing them. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36731 • CWE-20: Improper Input Validation •
CVE-2023-36732 – Win32k Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2023-36732
Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Win32k This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DEVLOCKBLTOBJ class in the win32kfull driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36732 •
CVE-2023-41774 – Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-41774
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en Layer 2 Tunneling Protocol • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41774 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •