CVE-2024-30049 – Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-30049
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del subsistema kernel de Windows Win32 • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30049 • CWE-416: Use After Free •
CVE-2024-30039 – Windows Remote Access Connection Manager Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2024-30039
Windows Remote Access Connection Manager Information Disclosure Vulnerability Vulnerabilidad de divulgación de información del Administrador de conexión de acceso remoto de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30039 • CWE-126: Buffer Over-read •
CVE-2024-30038 – Win32k Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-30038
Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Win32k CVE-2024-30088 is a Windows kernel elevation of privilege vulnerability which affects many recent versions of Windows 10, Windows 11 and Windows Server 2022. The vulnerability exists inside the function called AuthzBasepCopyoutInternalSecurityAttributes specifically when the kernel copies the _AUTHZBASEP_SECURITY_ATTRIBUTES_INFORMATION of the current token object to user mode. When the kernel performs the copy of the SecurityAttributesList, it sets up the list of the SecurityAttributes structure directly to the user supplied pointed. It then calls RtlCopyUnicodeString and AuthzBasepCopyoutInternalSecurityAttributeValues to copy out the names and values of the SecurityAttribute leading to multiple Time Of Check Time Of Use (TOCTOU) vulnerabilities in the function. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30038 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-30037 – Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-30037
Windows Common Log File System Driver Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del controlador del sistema de archivos de registro común de Windows This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Common Log File System (CLFS). The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30037 • CWE-125: Out-of-bounds Read •
CVE-2024-30032 – Windows DWM Core Library Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-30032
Windows DWM Core Library Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de la librería principal DWM de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30032 • CWE-416: Use After Free •