Detect date
?
|
11/11/2014 |
Severity
?
|
Critical |
Description
|
Multiple serious vulnerabilities have been found in Microsoft products. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service gain privileges, execute arbitrary code or obtain sensitive information. Below is a complete list of vulnerabilities
|
Affected products
|
Windows XP Service pack 3 |
Solution
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Original advisories
|
CVE-2014-1816 |
Impacts
?
|
ACE [?] OSI [?] DoS [?] SB [?] WLF [?] PE [?] RLF [?] SUI [?] LoI [?] |
Related products
|
Microsoft Windows Vista Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2003 Windows RT Microsoft Windows XP |
CVE-IDS
?
|
CVE-2014-18164.3Warning
CVE-2014-65329.3Critical CVE-2014-02667.1High CVE-2014-40767.2High CVE-2014-63224.3Warning CVE-2014-63249.0Critical CVE-2014-17677.2High CVE-2014-40779.3Critical CVE-2014-40747.2High CVE-2014-18077.2High CVE-2013-50657.2High CVE-2014-03007.2High CVE-2014-03236.6High CVE-2014-49717.2High CVE-2014-03019.3Critical CVE-2014-02627.2High CVE-2014-02639.3Critical CVE-2014-41157.2High CVE-2014-41137.2High CVE-2014-03156.9High CVE-2014-03167.5Critical CVE-2014-03175.4High CVE-2014-02555.0Critical CVE-2014-03187.2High CVE-2014-41189.3Critical CVE-2014-63529.3Critical CVE-2014-63329.3Critical CVE-2014-02965.1High CVE-2014-02565.0Critical CVE-2014-18115.0Critical CVE-2014-02547.8Critical CVE-2014-18197.2High CVE-2014-63555.0Critical CVE-2014-27806.9High CVE-2014-27817.6Critical CVE-2014-18129.0Critical CVE-2014-40644.9Warning CVE-2014-63184.3Warning CVE-2014-18147.2High CVE-2014-40606.8High CVE-2014-18249.3Critical CVE-2014-63177.1High CVE-2014-41149.3Critical CVE-2014-41489.3Critical |
Microsoft official advisories
|
Microsoft Security Update Guide |
KB list
|
2966631 |
Exploitation
|
Public exploits exist for this vulnerability. Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Find out the statistics of the vulnerabilities spreading in your region |