CVE-2024-38063 – Windows TCP/IP Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability • https://github.com/zenzue/CVE-2024-38063-POC https://github.com/diegoalbuquerque/CVE-2024-38063 https://github.com/Sachinart/CVE-2024-38063-POC https://github.com/Sachinart/CVE-2024-38063-poc https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix https://github.com/noradlb1/CVE-2024-38063-VB https://github.com/Th3Tr1ckst3r/CVE-2024-38063 https://github.com/dweger-scripts/CVE-2024-38063-Remediation https://github.com/ynwarcs/CVE-2024-38063 https://github.com/haroonawanoffi • CWE-191: Integer Underflow (Wrap or Wraparound) •
CVE-2024-38199 – Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-38199
Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38199 • CWE-416: Use After Free •
CVE-2024-38198 – Windows Print Spooler Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-38198
Windows Print Spooler Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38198 • CWE-345: Insufficient Verification of Data Authenticity •
CVE-2024-38196 – Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-38196
Windows Common Log File System Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38196 • CWE-20: Improper Input Validation •
CVE-2024-38193 – Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-38193
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Microsoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193 • CWE-416: Use After Free •