Descrição
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, cause denial of service, bypass security restrictions, obtain sensitive information, spoof user interface.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows SMB Server can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Projected File System can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Graphics Component can be exploited remotely to cause denial of service.
- A security feature bypass vulnerability in MapUrlToZone can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Device Association Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Connected Devices Platform Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Authentication can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Accessibility Infrastructure (ATBroker.exe) can be exploited remotely to obtain sensitive information.
- A spoofing vulnerability in Windows Shell Link Processing can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Windows Accessibility Infrastructure (ATBroker.exe) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Broadcast DVR can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Winlogon can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Extensible File Allocation Table can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An information disclosure vulnerability in GDI+ can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in GDI can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Performance Counters for Windows can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Print Spooler can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Mobile Broadband Driver can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows System Image Manager Assessment and Deployment Kit (ADK) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Bluetooth RFCOM Protocol Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Telephony Service can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Kerberos can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Active Directory Domain Services can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows NTFS can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Universal Disk Format File System Driver (UDFS) can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Push message Routing Service can be exploited remotely to obtain sensitive information.
Comunicados originais
- CVE-2026-24294
- CVE-2026-24290
- CVE-2026-24293
- CVE-2026-25168
- CVE-2026-23674
- CVE-2026-24295
- CVE-2026-24292
- CVE-2026-26111
- CVE-2026-25171
- CVE-2026-25186
- CVE-2026-25185
- CVE-2026-24291
- CVE-2026-25176
- CVE-2026-23667
- CVE-2026-25187
- CVE-2026-25174
- CVE-2026-25189
- CVE-2026-25178
- CVE-2026-24289
- CVE-2026-25181
- CVE-2026-25190
- CVE-2026-24296
- CVE-2026-25165
- CVE-2026-24285
- CVE-2026-23669
- CVE-2026-26128
- CVE-2026-25172
- CVE-2026-24288
- CVE-2026-25166
- CVE-2026-23673
- CVE-2026-23671
- CVE-2026-26132
- CVE-2026-25188
- CVE-2026-24297
- CVE-2026-25177
- CVE-2026-25175
- CVE-2026-24287
- CVE-2026-23672
- CVE-2026-25180
- CVE-2026-25179
- CVE-2026-25169
- CVE-2026-23668
- CVE-2026-24282
Exploração
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produtos relacionados
Lista de CVE
- CVE-2026-23667 high
- CVE-2026-23668 high
- CVE-2026-23669 critical
- CVE-2026-23671 high
- CVE-2026-23672 critical
- CVE-2026-23673 critical
- CVE-2026-23674 critical
- CVE-2026-24282 high
- CVE-2026-24285 high
- CVE-2026-24287 critical
- CVE-2026-24288 high
- CVE-2026-24289 critical
- CVE-2026-24290 critical
- CVE-2026-24291 critical
- CVE-2026-24292 critical
- CVE-2026-24293 critical
- CVE-2026-24294 critical
- CVE-2026-24295 high
- CVE-2026-24296 high
- CVE-2026-24297 high
- CVE-2026-25165 critical
- CVE-2026-25166 critical
- CVE-2026-25168 high
- CVE-2026-25169 high
- CVE-2026-25171 high
- CVE-2026-25172 critical
- CVE-2026-25173 critical
- CVE-2026-25174 critical
- CVE-2026-25175 critical
- CVE-2026-25176 critical
- CVE-2026-25177 critical
- CVE-2026-25178 high
- CVE-2026-25179 high
- CVE-2026-25180 high
- CVE-2026-25181 critical
- CVE-2026-25185 high
- CVE-2026-25186 high
- CVE-2026-25187 critical
- CVE-2026-25188 critical
- CVE-2026-25189 critical
- CVE-2026-25190 critical
- CVE-2026-26111 critical
- CVE-2026-26128 critical
- CVE-2026-26132 critical
Lista de KB
Saiba mais
Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com
Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!