CVE-2024-38238 – Kernel Streaming Service Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-38238
Kernel Streaming Service Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38238 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-38237 – Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-38237
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38237 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-38235 – Windows Hyper-V Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2024-38235
Windows Hyper-V Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38235 • CWE-416: Use After Free •
CVE-2024-38234 – Windows Networking Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2024-38234
Windows Networking Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38234 • CWE-20: Improper Input Validation •
CVE-2024-38217 – Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability
https://notcve.org/view.php?id=CVE-2024-38217
Windows Mark of the Web Security Feature Bypass Vulnerability Microsoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217 • CWE-693: Protection Mechanism Failure •