CVE-2024-49074 – Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-49074
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49074 • CWE-416: Use After Free •
CVE-2024-49073 – Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-49073
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49073 • CWE-20: Improper Input Validation •
CVE-2024-49039 – Microsoft Windows Task Scheduler Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-49039
Windows Task Scheduler Elevation of Privilege Vulnerability Microsoft Windows Task Scheduler contains a privilege escalation vulnerability that can allow an attacker-provided, local application to escalate privileges outside of its AppContainer, and access privileged RPC functions. • https://github.com/je5442804/WPTaskScheduler_CVE-2024-49039 https://github.com/Alexandr-bit253/CVE-2024-49039 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49039 • CWE-287: Improper Authentication •
CVE-2024-49019 – Active Directory Certificate Services Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-49019
Active Directory Certificate Services Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49019 • CWE-1390: Weak Authentication •
CVE-2024-38203 – Windows Package Library Manager Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2024-38203
Windows Package Library Manager Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38203 • CWE-693: Protection Mechanism Failure •