Chromium: CVE-2024-11116 Inappropriate implementation in Paint

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.


Chromium: CVE-2024-11113 Use after free in Accessibility

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.


CVE-2024-43639 Windows KDC Proxy Remote Code Execution Vulnerability

Updated the CVE title to better reflect the affected protocol and added an FAQ to explain that only Windows Servers that are configured with the [[MS-KKDCP]: Kerberos Key Distribution Center (KDC) Proxy Protocol](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-kkdcp/5bcebb8d-b747-4ee5-9453-428aec1c5c38) are affected.


CVE-2024-43638 Windows USB Video Class System Driver Elevation of Privilege Vulnerability

Information published.


CVE-2024-48995 SQL Server Native Client Remote Code Execution Vulnerability

Information published.


CVE-2024-43635 Windows Telephony Service Remote Code Execution Vulnerability

Information published.


CVE-2024-49005 SQL Server Native Client Remote Code Execution Vulnerability

Information published.


CVE-2024-49026 Microsoft Excel Remote Code Execution Vulnerability

Information published.


CVE-2024-43511 Windows Kernel Elevation of Privilege Vulnerability

The following updates have been made: 1) To comprehensively address this vulnerability, Microsoft has released October 2024 security updates for all affected client versions of Windows 10 and Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.2) FAQ added to explain further recommended actions to take after installing the November 2024 security update: This update affects a component of Virtualization-based Security (VBS). The policy mitigations described in [KB5042562: Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates – Microsoft Support](https://support.microsoft.com/en-us/topic/kb5042562-guidance-for-blocking-rollback-of-virtualization-based-security-vbs-related-security-updates-b2e7ebf4-f64d-4884-a390-38d63171b8d3) have been updated to accommodate these changes. If you have previously applied the mitigation policies, we recommend that you consider updating to the latest policies.


CVE-2024-43643 Windows USB Video Class System Driver Elevation of Privilege Vulnerability

Information published.


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

AbuseIPDB Contributor Badge