CVE-2024-43621 – Windows Telephony Service Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-43621
Windows Telephony Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43621 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-43620 – Windows Telephony Service Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-43620
Windows Telephony Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43620 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-49046 – Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-49046
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49046 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2024-43452 – Windows Registry Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-43452
Windows Registry Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43452 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2024-43451 – Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability
https://notcve.org/view.php?id=CVE-2024-43451
NTLM Hash Disclosure Spoofing Vulnerability Microsoft Windows contains an NTLMv2 hash spoofing vulnerability that could result in disclosing a user's NTLMv2 hash to an attacker via a file open operation. The attacker could then leverage this hash to impersonate that user. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43451 • CWE-73: External Control of File Name or Path •