Descrição
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A denial of service vulnerability in DNS protocol can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Wi-Fi Driver can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Streaming Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Winlogon can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Storage can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Win32 Kernel Subsystem can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Distributed File System (DFS) can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Themes can be exploited remotely to cause denial of service.
- A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Perception Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Speech Application Programming Interface (SAPI) can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Cryptographic Services can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Container Manager Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Event Trace Log File Parsing can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in WiX toolset can be exploited to gain privileges.
Comunicados originais
- CVE-2024-30080
- CVE-2024-30091
- CVE-2024-35250
- CVE-2024-30084
- CVE-2024-30078
- CVE-2024-30090
- CVE-2024-30066
- CVE-2024-30062
- CVE-2024-30093
- CVE-2024-30087
- CVE-2024-30086
- CVE-2024-30083
- CVE-2024-30095
- CVE-2024-30067
- CVE-2024-30077
- CVE-2024-30082
- CVE-2024-30094
- CVE-2024-30063
- CVE-2024-30065
- CVE-2024-30070
- CVE-2024-35265
- CVE-2024-30069
- CVE-2024-30085
- CVE-2024-30099
- CVE-2024-30068
- CVE-2024-30088
- CVE-2024-30097
- CVE-2024-30096
- CVE-2024-30064
- CVE-2024-30076
- CVE-2024-30072
- CVE-2024-30089
- CVE-2024-29187
Exploração
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produtos relacionados
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Windows-Server-2022
Lista de CVE
- CVE-2023-50868 critical
- CVE-2024-29187 high
- CVE-2024-30080 critical
- CVE-2024-30091 critical
- CVE-2024-35250 critical
- CVE-2024-30084 high
- CVE-2024-30078 critical
- CVE-2024-30090 high
- CVE-2024-30066 high
- CVE-2024-30062 critical
- CVE-2024-30093 high
- CVE-2024-30087 critical
- CVE-2024-30086 critical
- CVE-2024-30083 critical
- CVE-2024-30095 critical
- CVE-2024-30067 high
- CVE-2024-30077 critical
- CVE-2024-30082 critical
- CVE-2024-30094 critical
- CVE-2024-30063 high
- CVE-2024-30065 high
- CVE-2024-30070 critical
- CVE-2024-35265 high
- CVE-2024-30069 warning
- CVE-2024-30085 critical
- CVE-2024-30099 high
- CVE-2024-30068 critical
- CVE-2024-30088 high
- CVE-2024-30097 critical
- CVE-2024-30096 high
- CVE-2024-30064 critical
- CVE-2024-30076 high
- CVE-2024-30072 critical
- CVE-2024-30089 critical
Lista de KB
Saiba mais
Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com
Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!