Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, gain privileges, execute arbitrary code, cause denial of service, spoof user interface.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Windows Event Tracing can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Early Launch Antimalware Driver can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in NTFS can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Azure AD Web Sign-in can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Raw Image Extension can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Console Driver can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Overlay Filter can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows Media Video Decoder can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Windows Installer can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft Internet Messaging API can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Windows Hyper-V can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in RPC Endpoint Mapper Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows SMB can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Resource Manager PSM Service Extension can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Diagnostics Hub Standard Collector Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows GDI+ can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Services and Controller App can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Media Photo Codec can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows GDI+ can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows NTFS can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Portmapping can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Event Tracing can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows TCP/IP Driver can be exploited remotely to cause denial of service.
- A denial of service vulnerability in Windows Application Compatibility Cache can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows DNS can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Secure Kernel Mode can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Speech Runtime can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Microsoft Windows Codecs Library can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Hyper-V can be exploited remotely to gain privileges.
- A remote code execution vulnerability in VP9 Video Extensions can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Installer can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- A security feature bypass vulnerability in Windows WLAN AutoConfig Service can be exploited remotely to bypass security restrictions.
- A denial of service vulnerability in Windows AppX Deployment Server can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Network File System can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows TCP/IP can be exploited remotely to obtain sensitive information.
Original advisories
- CVE-2021-28447
- CVE-2021-27096
- CVE-2021-28330
- CVE-2021-28338
- CVE-2021-27092
- CVE-2021-28329
- CVE-2021-28468
- CVE-2021-28438
- CVE-2021-26417
- CVE-2021-28332
- CVE-2021-28309
- CVE-2021-28342
- CVE-2021-27095
- CVE-2021-28334
- CVE-2021-26413
- CVE-2021-27089
- CVE-2021-27094
- CVE-2021-28358
- CVE-2021-28444
- CVE-2021-28336
- CVE-2021-28440
- CVE-2021-27091
- CVE-2021-28325
- CVE-2021-28441
- CVE-2021-28320
- CVE-2021-28322
- CVE-2021-28350
- CVE-2021-28335
- CVE-2021-28352
- CVE-2021-27086
- CVE-2021-27079
- CVE-2021-28340
- CVE-2021-28318
- CVE-2021-28312
- CVE-2021-28446
- CVE-2021-27072
- CVE-2021-28331
- CVE-2021-27088
- CVE-2021-28319
- CVE-2021-28311
- CVE-2021-28466
- CVE-2021-28356
- CVE-2021-28328
- CVE-2021-28349
- CVE-2021-28439
- CVE-2021-28313
- CVE-2021-28315
- CVE-2021-28344
- CVE-2021-27090
- CVE-2021-28355
- CVE-2021-28339
- CVE-2021-28351
- CVE-2021-28347
- CVE-2021-27093
- CVE-2021-28317
- CVE-2021-28345
- CVE-2021-28314
- CVE-2021-28464
- CVE-2021-28333
- CVE-2021-28323
- CVE-2021-28434
- CVE-2021-28437
- CVE-2021-26416
- CVE-2021-28316
- CVE-2021-28341
- CVE-2021-28321
- CVE-2021-28436
- CVE-2021-28337
- CVE-2021-28357
- CVE-2021-28310
- CVE-2021-28324
- CVE-2021-28326
- CVE-2021-28445
- CVE-2021-28346
- CVE-2021-28327
- CVE-2021-28353
- CVE-2021-26415
- CVE-2021-28443
- CVE-2021-28442
- CVE-2021-28348
- CVE-2021-28354
- CVE-2021-28343
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Visual-Studio
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
CVE list
- CVE-2021-28435 high
- CVE-2021-28447 warning
- CVE-2021-27096 critical
- CVE-2021-28330 critical
- CVE-2021-28338 critical
- CVE-2021-27092 high
- CVE-2021-28329 critical
- CVE-2021-28468 critical
- CVE-2021-28438 high
- CVE-2021-26417 high
- CVE-2021-28332 critical
- CVE-2021-28309 high
- CVE-2021-28342 critical
- CVE-2021-27095 critical
- CVE-2021-28334 critical
- CVE-2021-26413 high
- CVE-2021-27089 critical
- CVE-2021-27094 warning
- CVE-2021-28358 critical
- CVE-2021-28444 high
- CVE-2021-28336 critical
- CVE-2021-28440 high
- CVE-2021-27091 critical
- CVE-2021-28325 high
- CVE-2021-28441 high
- CVE-2021-28320 critical
- CVE-2021-28322 critical
- CVE-2021-28350 critical
- CVE-2021-28335 critical
- CVE-2021-28352 critical
- CVE-2021-27086 critical
- CVE-2021-27079 high
- CVE-2021-28340 critical
- CVE-2021-28318 high
- CVE-2021-28312 warning
- CVE-2021-28446 high
- CVE-2021-27072 high
- CVE-2021-28331 critical
- CVE-2021-27088 critical
- CVE-2021-28319 critical
- CVE-2021-28311 high
- CVE-2021-28466 critical
- CVE-2021-28356 critical
- CVE-2021-28328 high
- CVE-2021-28349 critical
- CVE-2021-28439 critical
- CVE-2021-28313 critical
- CVE-2021-28315 critical
- CVE-2021-28344 critical
- CVE-2021-27090 critical
- CVE-2021-28355 critical
- CVE-2021-28339 critical
- CVE-2021-28351 critical
- CVE-2021-28347 critical
- CVE-2021-27093 high
- CVE-2021-28317 high
- CVE-2021-28345 critical
- CVE-2021-28314 critical
- CVE-2021-28464 critical
- CVE-2021-28333 critical
- CVE-2021-28323 high
- CVE-2021-28434 critical
- CVE-2021-28437 high
- CVE-2021-26416 critical
- CVE-2021-28316 warning
- CVE-2021-28341 critical
- CVE-2021-28321 critical
- CVE-2021-28436 critical
- CVE-2021-28337 critical
- CVE-2021-28357 critical
- CVE-2021-28310 critical
- CVE-2021-28324 critical
- CVE-2021-28326 high
- CVE-2021-28445 critical
- CVE-2021-28346 critical
- CVE-2021-28327 critical
- CVE-2021-28353 critical
- CVE-2021-26415 critical
- CVE-2021-28443 high
- CVE-2021-28442 high
- CVE-2021-28348 critical
- CVE-2021-28354 critical
- CVE-2021-28343 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!