CVE-2024-6769 – Medium to High Integrity Privilege Escalation in Microsoft Windows
https://notcve.org/view.php?id=CVE-2024-6769
A DLL Hijacking caused by drive remapping combined with a poisoning of the activation cache in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated attacker to elevate from a medium integrity process to a high integrity process without the intervention of a UAC prompt. • https://github.com/fortra/CVE-2024-6769 https://www.fortra.com/security/advisories/research/fr-2024-002 • CWE-426: Untrusted Search Path •
CVE-2024-43487 – Windows Mark of the Web Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-43487
Windows Mark of the Web Security Feature Bypass Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43487 • CWE-693: Protection Mechanism Failure •
CVE-2024-30073 – Windows Security Zone Mapping Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-30073
Windows Security Zone Mapping Security Feature Bypass Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30073 • CWE-41: Improper Resolution of Path Equivalence •
CVE-2024-43455 – Windows Remote Desktop Licensing Service Spoofing Vulnerability
https://notcve.org/view.php?id=CVE-2024-43455
Windows Remote Desktop Licensing Service Spoofing Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43455 • CWE-20: Improper Input Validation •
CVE-2024-43454 – Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-43454
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43454 • CWE-23: Relative Path Traversal •