CVE-2024-43592 – Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-43592
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43592 • CWE-20: Improper Input Validation CWE-122: Heap-based Buffer Overflow •
CVE-2024-43589 – Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-43589
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43589 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-43585 – Code Integrity Guard Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-43585
Code Integrity Guard Security Feature Bypass Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43585 • CWE-693: Protection Mechanism Failure •
CVE-2024-43584 – Windows Scripting Engine Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-43584
Windows Scripting Engine Security Feature Bypass Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43584 • CWE-693: Protection Mechanism Failure •
CVE-2024-43582 – Remote Desktop Protocol Server Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-43582
Remote Desktop Protocol Server Remote Code Execution Vulnerability • https://github.com/jinxongwi/CVE-2024-43582-RCE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43582 • CWE-416: Use After Free •