
CVE-2024-43621 – Windows Telephony Service Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-43621
12 Nov 2024 — Windows Telephony Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43621 • CWE-122: Heap-based Buffer Overflow •

CVE-2024-43620 – Windows Telephony Service Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-43620
12 Nov 2024 — Windows Telephony Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43620 • CWE-122: Heap-based Buffer Overflow •

CVE-2024-49046 – Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-49046
12 Nov 2024 — Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49046 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2024-38264 – Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2024-38264
12 Nov 2024 — Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38264 • CWE-591: Sensitive Data Storage in Improperly Locked Memory •

CVE-2024-43452 – Windows Registry Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-43452
12 Nov 2024 — Windows Registry Elevation of Privilege Vulnerability The Microsoft Windows kernel has double-fetch vulnerability in the loading of remote registry hives that can lead to memory corruption. • https://packetstorm.news/files/id/182938 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2024-43451 – Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability
https://notcve.org/view.php?id=CVE-2024-43451
12 Nov 2024 — NTLM Hash Disclosure Spoofing Vulnerability Microsoft Windows contains an NTLMv2 hash spoofing vulnerability that could result in disclosing a user's NTLMv2 hash to an attacker via a file open operation. The attacker could then leverage this hash to impersonate that user. • https://github.com/RonF98/CVE-2024-43451-POC • CWE-73: External Control of File Name or Path •

CVE-2024-43449 – Windows USB Video Class System Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-43449
12 Nov 2024 — Windows USB Video Class System Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43449 • CWE-125: Out-of-bounds Read •

CVE-2024-43646 – Windows Secure Kernel Mode Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-43646
12 Nov 2024 — Windows Secure Kernel Mode Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43646 • CWE-822: Untrusted Pointer Dereference •

CVE-2024-43644 – Windows Client-Side Caching Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-43644
12 Nov 2024 — Windows Client-Side Caching Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43644 • CWE-125: Out-of-bounds Read •

CVE-2024-43643 – Windows USB Video Class System Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-43643
12 Nov 2024 — Windows USB Video Class System Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43643 • CWE-125: Out-of-bounds Read •