CVE-2024-49090 – Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-49090
Windows Common Log File System Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49090 • CWE-822: Untrusted Pointer Dereference •
CVE-2024-49088 – Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-49088
Windows Common Log File System Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49088 • CWE-126: Buffer Over-read •
CVE-2024-49082 – Windows File Explorer Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2024-49082
Windows File Explorer Information Disclosure Vulnerability This vulnerability allows remote attackers to delete arbitrary files or disclose sensitive information on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability. The specific flaw exists within the handling of filenames. The issue results from the lack of proper validation of filenames originating from untrusted sources, which may contain path traversal characters. An attacker can leverage this vulnerability to delete files or disclose information in the context of the current user. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49082 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2024-49080 – Windows IP Routing Management Snapin Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-49080
Windows IP Routing Management Snapin Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49080 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-49079 – Input Method Editor (IME) Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-49079
Input Method Editor (IME) Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49079 • CWE-416: Use After Free •