
CVE-2024-26253 – Windows rndismp6.sys Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-26253
09 Apr 2024 — Windows rndismp6.sys Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en Windows rndismp6.sys • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26253 • CWE-20: Improper Input Validation •

CVE-2024-26252 – Windows rndismp6.sys Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-26252
09 Apr 2024 — Windows rndismp6.sys Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en Windows rndismp6.sys • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26252 • CWE-822: Untrusted Pointer Dereference •

CVE-2024-26250 – Secure Boot Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-26250
09 Apr 2024 — Secure Boot Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la función de seguridad de arranque seguro • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26250 • CWE-693: Protection Mechanism Failure •

CVE-2024-20689 – Secure Boot Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-20689
09 Apr 2024 — Secure Boot Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la función de seguridad de arranque seguro • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20689 • CWE-121: Stack-based Buffer Overflow •

CVE-2024-20688 – Secure Boot Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-20688
09 Apr 2024 — Secure Boot Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la función de seguridad de arranque seguro • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20688 • CWE-121: Stack-based Buffer Overflow •

CVE-2024-20669 – Secure Boot Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-20669
09 Apr 2024 — Secure Boot Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la función de seguridad de arranque seguro • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20669 • CWE-693: Protection Mechanism Failure •

CVE-2024-26158 – Microsoft Install Service Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-26158
09 Apr 2024 — Microsoft Install Service Elevation of Privilege Vulnerability This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Windows Installer service. By creating a symbolic link, an attacker can abuse the service to write arbitrary registry values. An attacker can leverage this vulnerabil... • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26158 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2024-29988 – Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-29988
09 Apr 2024 — SmartScreen Prompt Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la función de seguridad de solicitud de SmartScreen This vulnerability allows remote attackers to bypass the SmartScreen security feature to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Internet Shortcut (.URL) files. Th... • https://github.com/Sploitus/CVE-2024-29988-exploit • CWE-693: Protection Mechanism Failure •

CVE-2024-27265 – IBM Integration Bus for z/OS cross-site request forgery
https://notcve.org/view.php?id=CVE-2024-27265
14 Mar 2024 — IBM Integration Bus for z/OS 10.1 through 10.1.0.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 284564. IBM Integration Bus para z/OS 10.1 a 10.1.0.3 es vulnerable a cross-site request forgery, lo que podría permitir a un atacante ejecutar acciones maliciosas y no autorizadas transmitidas por un usuario en el que confía el sitio web. ID de IBM X-Force: 284564. • https://exchange.xforce.ibmcloud.com/vulnerabilities/284564 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2024-26185 – Windows Compressed Folder Tampering Vulnerability
https://notcve.org/view.php?id=CVE-2024-26185
12 Mar 2024 — Windows Compressed Folder Tampering Vulnerability Vulnerabilidad de manipulación de carpetas comprimidas de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26185 • CWE-73: External Control of File Name or Path •