Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, gain privileges, spoof user interface, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Windows Kernel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft WDAC OLE DB provider for SQL Server can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Pragmatic General Multicast (PGM) can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows DNS Client can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Microsoft ActiveX Data Objects can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- A DNSSEC verification vulnerability can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Trusted Compute Base can be exploited remotely to gain privileges.
- A denial of service vulnerability in Internet Connection Sharing (ICS) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows USB Generic Parent Driver can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft WDAC ODBC Driver can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows Printing Service can be exploited remotely to spoof user interface.
- A denial of service vulnerability in Windows Network Address Translation (NAT) can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows DNS can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Windows Kernel can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft ODBC Driver can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Windows SmartScreen can be exploited remotely to bypass security restrictions.
- A security feature bypass vulnerability in Internet Shortcut Files can be exploited remotely to bypass security restrictions.
Original advisories
- CVE-2024-21365
- CVE-2024-21342
- CVE-2024-21359
- CVE-2024-21368
- CVE-2024-21367
- CVE-2024-21349
- CVE-2024-21340
- CVE-2023-50387
- CVE-2024-21338
- CVE-2024-21304
- CVE-2024-21348
- CVE-2024-21339
- CVE-2024-21360
- CVE-2024-21370
- CVE-2024-21353
- CVE-2024-21405
- CVE-2024-21355
- CVE-2024-21420
- CVE-2024-21358
- CVE-2024-21361
- CVE-2024-21369
- CVE-2024-21346
- CVE-2024-21406
- CVE-2024-21350
- CVE-2024-21345
- CVE-2024-21344
- CVE-2024-21371
- CVE-2024-21377
- CVE-2024-21354
- CVE-2024-21356
- CVE-2024-21391
- CVE-2024-21372
- CVE-2024-21343
- CVE-2024-21352
- CVE-2024-21375
- CVE-2024-21362
- CVE-2024-21347
- CVE-2024-21366
- CVE-2024-21363
- CVE-2024-21351
- CVE-2024-21412
- CVE-2024-21357
- CVE-2024-20684
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
CVE list
- CVE-2024-21341 high
- CVE-2024-21365 critical
- CVE-2024-21357 critical
- CVE-2024-21342 critical
- CVE-2024-21359 critical
- CVE-2024-21368 critical
- CVE-2024-21367 critical
- CVE-2024-21349 critical
- CVE-2024-21340 warning
- CVE-2023-50387 critical
- CVE-2024-21338 critical
- CVE-2024-21304 warning
- CVE-2024-21348 critical
- CVE-2024-21339 high
- CVE-2024-21360 critical
- CVE-2024-21370 critical
- CVE-2024-21353 critical
- CVE-2024-21405 high
- CVE-2024-21355 high
- CVE-2024-21420 critical
- CVE-2024-21358 critical
- CVE-2024-21361 critical
- CVE-2024-20684 high
- CVE-2024-21369 critical
- CVE-2024-21346 critical
- CVE-2024-21406 critical
- CVE-2024-21350 critical
- CVE-2024-21345 critical
- CVE-2024-21344 high
- CVE-2024-21371 high
- CVE-2024-21377 high
- CVE-2024-21354 critical
- CVE-2024-21356 high
- CVE-2024-21391 critical
- CVE-2024-21372 critical
- CVE-2024-21343 critical
- CVE-2024-21352 critical
- CVE-2024-21375 critical
- CVE-2024-21362 high
- CVE-2024-21347 critical
- CVE-2024-21366 critical
- CVE-2024-21363 critical
- CVE-2024-21351 critical
- CVE-2024-21412 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!