CVE-2024-38234 – Windows Networking Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2024-38234
Windows Networking Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38234 • CWE-20: Improper Input Validation •
CVE-2024-38233 – Windows Networking Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2024-38233
Windows Networking Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38233 • CWE-476: NULL Pointer Dereference •
CVE-2024-38232 – Windows Networking Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2024-38232
Windows Networking Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38232 • CWE-476: NULL Pointer Dereference •
CVE-2024-38231 – Windows Remote Desktop Licensing Service Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2024-38231
Windows Remote Desktop Licensing Service Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38231 • CWE-285: Improper Authorization •
CVE-2024-38217 – Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability
https://notcve.org/view.php?id=CVE-2024-38217
Windows Mark of the Web Security Feature Bypass Vulnerability Microsoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217 • CWE-693: Protection Mechanism Failure •