CVE-2024-26200 – Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-26200
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código del Servicio de enrutamiento y acceso remoto de Windows (RRAS) • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26200 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-26179 – Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-26179
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código del Servicio de enrutamiento y acceso remoto de Windows (RRAS) • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26179 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-26253 – Windows rndismp6.sys Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-26253
Windows rndismp6.sys Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en Windows rndismp6.sys • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26253 • CWE-20: Improper Input Validation •
CVE-2024-26252 – Windows rndismp6.sys Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-26252
Windows rndismp6.sys Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en Windows rndismp6.sys • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26252 • CWE-822: Untrusted Pointer Dereference •
CVE-2024-26158 – Microsoft Install Service Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-26158
Microsoft Install Service Elevation of Privilege Vulnerability This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Windows Installer service. By creating a symbolic link, an attacker can abuse the service to write arbitrary registry values. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26158 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •