CVE-2024-30067 – Winlogon Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-30067
Winlogon Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de Winlogon • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30067 • CWE-190: Integer Overflow or Wraparound •
CVE-2024-30066 – Winlogon Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-30066
Winlogon Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de Winlogon • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30066 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-30065 – Windows Themes Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2024-30065
Windows Themes Denial of Service Vulnerability Vulnerabilidad de denegación de servicio en temas de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30065 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2024-30063 – Windows Distributed File System (DFS) Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-30063
Windows Distributed File System (DFS) Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código del sistema de archivos distribuido (DFS) de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30063 • CWE-641: Improper Restriction of Names for Files and Other Resources •
CVE-2024-35250 – Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-35250
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del controlador en modo kernel de Windows This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the UnserializePropertySet function. The issue results from improper handling of privilege context transitions. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://github.com/varwara/CVE-2024-35250 https://github.com/0xjiefeng/CVE-2024-35250-BOF https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35250 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-822: Untrusted Pointer Dereference •