CVE-2024-38059Use After Free in Microsoft Windows 10 Version 21h2

CWE-416Use After Free8 documents6 sources
Severity
7.8HIGHCNA
No vector
EPSS
9.0%
top 7.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 9

Description

Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability

Affected Packages7 packages

CVEListV5microsoft/windows_server_202210.0.20348.010.0.20348.2582
CVEListV5microsoft/windows_10_version_21h210.0.19043.010.0.19044.4651
CVEListV5microsoft/windows_10_version_22h210.0.19045.010.0.19045.4651
CVEListV5microsoft/windows_11_version_21h210.0.010.0.22000.3079
CVEListV5microsoft/windows_11_version_22h210.0.22621.010.0.22621.3880

🔴Vulnerability Details

1
CVEList
Win32k Elevation of Privilege Vulnerability2024-07-09

📋Vendor Advisories

1
Microsoft
Win32k Elevation of Privilege Vulnerability2024-07-09

🕵️Threat Intelligence

6
Trendmicro
The July 2024 Security Update Review2024-07-09
Tenable
Microsoft’s July 2024 Patch Tuesday Addresses 138 CVEs (CVE-2024-38080, CVE-2024-38112)2024-07-09
Qualys
Microsoft and Adobe Patch Tuesday, July 2024 Security Update Review2024-07-09
Trendmicro
The July 2024 Security Update Review2024-07-09
Qualys
Microsoft and Adobe July 2024 Security Patches Explained | Qualys2024-07-09
CVE-2024-38059 — Use After Free in Microsoft | cvebase