CVE-2024-38116 – Windows IP Routing Management Snapin Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-38116
Windows IP Routing Management Snapin Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38116 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-38115 – Windows IP Routing Management Snapin Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-38115
Windows IP Routing Management Snapin Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38115 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-38114 – Windows IP Routing Management Snapin Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-38114
Windows IP Routing Management Snapin Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38114 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-38107 – Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-38107
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability Microsoft Windows Power Dependency Coordinator contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to obtain SYSTEM privileges. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107 • CWE-416: Use After Free •
CVE-2024-38106 – Microsoft Windows Kernel Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-38106
Windows Kernel Elevation of Privilege Vulnerability Microsoft Windows Kernel contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. Successful exploitation of this vulnerability requires an attacker to win a race condition. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106 • CWE-591: Sensitive Data Storage in Improperly Locked Memory •