
CVE-2024-38107 – Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-38107
13 Aug 2024 — Windows Power Dependency Coordinator Elevation of Privilege Vulnerability Microsoft Windows Power Dependency Coordinator contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to obtain SYSTEM privileges. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107 • CWE-416: Use After Free •

CVE-2024-38106 – Microsoft Windows Kernel Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-38106
13 Aug 2024 — Windows Kernel Elevation of Privilege Vulnerability Microsoft Windows Kernel contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. Successful exploitation of this vulnerability requires an attacker to win a race condition. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106 • CWE-591: Sensitive Data Storage in Improperly Locked Memory •

CVE-2024-38063 – Windows TCP/IP Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-38063
13 Aug 2024 — Windows TCP/IP Remote Code Execution Vulnerability • https://packetstorm.news/files/id/180422 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2024-38199 – Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-38199
13 Aug 2024 — Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38199 • CWE-416: Use After Free •

CVE-2024-38198 – Windows Print Spooler Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-38198
13 Aug 2024 — Windows Print Spooler Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38198 • CWE-345: Insufficient Verification of Data Authenticity •

CVE-2024-38196 – Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-38196
13 Aug 2024 — Windows Common Log File System Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38196 • CWE-20: Improper Input Validation •

CVE-2024-38193 – Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-38193
13 Aug 2024 — Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Microsoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. • https://github.com/killvxk/CVE-2024-38193-Nephster • CWE-416: Use After Free •

CVE-2024-38178 – Microsoft Windows Scripting Engine Memory Corruption Vulnerability
https://notcve.org/view.php?id=CVE-2024-38178
13 Aug 2024 — Scripting Engine Memory Corruption Vulnerability Microsoft Windows Scripting Engine contains a memory corruption vulnerability that allows unauthenticated attacker to initiate remote code execution via a specially crafted URL. • https://github.com/uixss/PoC-CVE-2024-38178 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVE-2024-38123 – Windows Bluetooth Driver Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2024-38123
13 Aug 2024 — Windows Bluetooth Driver Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38123 • CWE-125: Out-of-bounds Read •

CVE-2024-21302 – Windows Secure Kernel Mode Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-21302
08 Aug 2024 — Summary: Microsoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS) including a subset of Azure Virtual Machine SKUS; enabling an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS. For mo... • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21302 • CWE-284: Improper Access Control •