Last updated on Oct 9, 2024
S.No Vulnerability Name Severity
Windows Scripting Engine Memory Corruption Vulnerability for Windows 11 Version 23H2 for x64-based Systems (KB5032190)Critical
Windows Media Remote Code Execution Vulnerability for Windows 11 Version 23H2 for x64-based Systems (KB5033375)Critical
Windows HTML Platforms Security Feature Bypass Vulnerability for Windows 11 Version 23H2 for x64-based Systems (KB5034123)Critical
Windows Hyper-V Denial of Service Vulnerability for Windows 11 Version 23H2 for x64-based Systems (KB5034765)Critical
Windows Hyper-V Remote Code Execution Vulnerability for Windows 11 Version 23H2 for x64-based Systems (KB5035853)Critical
BitLocker Security Feature Bypass Vulnerability for Windows 11 Version 23H2 for x64-based Systems (KB5036893)Critical
Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability for Windows 11 Version 23H2 for x64-based Systems (KB5037771)Critical
Windows Distributed File System (DFS) Remote Code Execution Vulnerability for Windows 11 Version 23H2 for x64-based Systems (KB5039212)Critical
Windows Text Services Framework Elevation of Privilege Vulnerability for Windows 11 Version 23H2 for x64-based Systems (KB5040442)Important
Windows Update Stack Elevation of Privilege VulnerabilityImportant
Windows Secure Kernel Mode Elevation of Privilege VulnerabilityImportant
Windows Kernel Elevation of Privilege Vulnerability for Windows 11 Version 23H2 for x64-based Systems (KB5041585)Critical
Windows Installer Elevation of Privilege Vulnerability for Windows 11 Version 23H2 for x64-based Systems (KB5043076)Low
Windows libarchive Remote Code Execution Vulnerability for Windows 11 Version 23H2 for x64-based Systems (KB5040442)Low
Open Source Curl Remote Code Execution Vulnerability for Windows 11 Version 23H2 for x64-based Systems (KB5044285)Low

Disclaimer: This webpage is intended to provide you information about vulnerability announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.