Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, bypass security restrictions, cause denial of service, gain privileges, spoof user interface.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability can be exploited remotely to bypass security restrictions.
- A denial of service vulnerability in HTTP.sys can be exploited remotely to cause denial of service.
- A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Defender Credential Guard can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Secure Boot can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in DHCP Server Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Cryptographic Services can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Kerberos can be exploited remotely to cause denial of service.
- A spoofing vulnerability in Proxy Driver can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Microsoft Install Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows rndismp6.sys can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Local Security Authority Subsystem Service can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Telephony Server can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Update Stack can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Brokering File System can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows USB Print Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in libarchive can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Microsoft Virtual Machine Bus (VMBus) can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Distributed File System (DFS) can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft WDAC OLE DB Provider for SQL Server can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows SMB can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows CSC Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Storage can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Authentication can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Cryptographic Services can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Windows Distributed File System (DFS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows File Server Resource Management Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Mobile Hotspot can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in SmartScreen Prompt can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft WDAC SQL Server ODBC Driver can be exploited remotely to execute arbitrary code.
Original advisories
- CVE-2024-26227
- CVE-2024-23593
- CVE-2024-26219
- CVE-2024-26215
- CVE-2024-26237
- CVE-2024-26172
- CVE-2024-28900
- CVE-2022-0001
- CVE-2024-26168
- CVE-2024-28921
- CVE-2024-26195
- CVE-2024-29050
- CVE-2024-26179
- CVE-2024-28901
- CVE-2024-26183
- CVE-2024-28923
- CVE-2024-26234
- CVE-2024-26158
- CVE-2024-28903
- CVE-2024-20678
- CVE-2024-26253
- CVE-2024-26202
- CVE-2024-29064
- CVE-2024-26180
- CVE-2024-20665
- CVE-2024-28925
- CVE-2024-26208
- CVE-2024-26209
- CVE-2024-26242
- CVE-2024-26175
- CVE-2024-26252
- CVE-2024-28898
- CVE-2024-26235
- CVE-2024-26231
- CVE-2024-28924
- CVE-2024-28907
- CVE-2024-28896
- CVE-2024-26218
- CVE-2024-26243
- CVE-2024-26256
- CVE-2024-26254
- CVE-2024-28905
- CVE-2024-26224
- CVE-2024-26226
- CVE-2024-26241
- CVE-2024-26205
- CVE-2024-26207
- CVE-2024-26244
- CVE-2024-26221
- CVE-2024-28920
- CVE-2024-20693
- CVE-2024-26245
- CVE-2024-20669
- CVE-2024-26240
- CVE-2024-26229
- CVE-2024-29052
- CVE-2024-29061
- CVE-2024-29056
- CVE-2024-26228
- CVE-2024-28922
- CVE-2024-26194
- CVE-2024-29066
- CVE-2024-29062
- CVE-2024-26236
- CVE-2024-26213
- CVE-2024-26223
- CVE-2024-26222
- CVE-2024-26230
- CVE-2024-26216
- CVE-2024-26233
- CVE-2024-26217
- CVE-2024-26220
- CVE-2024-28904
- CVE-2024-26248
- CVE-2024-26232
- CVE-2024-23594
- CVE-2024-28902
- CVE-2024-26200
- CVE-2024-26210
- CVE-2024-21447
- CVE-2024-28897
- CVE-2024-26171
- CVE-2024-26211
- CVE-2024-29988
- CVE-2024-26189
- CVE-2024-26214
- CVE-2024-26239
- CVE-2024-26212
- CVE-2024-26250
- CVE-2024-28919
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
CVE list
- CVE-2022-0001 high
- CVE-2024-26255 high
- CVE-2024-26227 warning
- CVE-2024-23593 high
- CVE-2024-26219 critical
- CVE-2024-26215 critical
- CVE-2024-26237 critical
- CVE-2024-26172 high
- CVE-2024-28900 high
- CVE-2024-26168 high
- CVE-2024-28921 high
- CVE-2024-26195 high
- CVE-2024-29050 critical
- CVE-2024-26179 critical
- CVE-2024-28901 high
- CVE-2024-26183 high
- CVE-2024-28923 high
- CVE-2024-26234 high
- CVE-2024-26158 warning
- CVE-2024-28903 high
- CVE-2024-20678 critical
- CVE-2024-26253 high
- CVE-2024-26202 high
- CVE-2024-29064 warning
- CVE-2024-26180 critical
- CVE-2024-20665 high
- CVE-2024-28925 critical
- CVE-2024-26208 high
- CVE-2024-26209 high
- CVE-2024-26242 high
- CVE-2024-26175 critical
- CVE-2024-26252 warning
- CVE-2024-28898 high
- CVE-2024-26235 critical
- CVE-2024-26231 high
- CVE-2024-28924 high
- CVE-2024-28907 critical
- CVE-2024-28896 critical
- CVE-2024-26218 critical
- CVE-2024-26243 high
- CVE-2024-26256 critical
- CVE-2024-26254 critical
- CVE-2024-28905 warning
- CVE-2024-26224 warning
- CVE-2024-26226 high
- CVE-2024-26241 critical
- CVE-2024-26205 critical
- CVE-2024-26207 high
- CVE-2024-26244 warning
- CVE-2024-26221 high
- CVE-2024-28920 critical
- CVE-2024-20693 critical
- CVE-2024-26245 critical
- CVE-2024-20669 high
- CVE-2024-26240 critical
- CVE-2024-26229 critical
- CVE-2024-29052 critical
- CVE-2024-29061 critical
- CVE-2024-29056 warning
- CVE-2024-26228 critical
- CVE-2024-28922 warning
- CVE-2024-26194 high
- CVE-2024-29066 high
- CVE-2024-29062 high
- CVE-2024-26236 high
- CVE-2024-26213 high
- CVE-2024-26223 high
- CVE-2024-26222 high
- CVE-2024-26230 critical
- CVE-2024-26216 high
- CVE-2024-26233 high
- CVE-2024-26217 high
- CVE-2024-26220 warning
- CVE-2024-28904 critical
- CVE-2024-26248 critical
- CVE-2024-26232 high
- CVE-2024-23594 high
- CVE-2024-28902 high
- CVE-2024-26200 critical
- CVE-2024-26210 critical
- CVE-2024-21447 critical
- CVE-2024-28897 high
- CVE-2024-26171 high
- CVE-2024-26211 warning
- CVE-2024-29988 critical
- CVE-2024-26189 warning
- CVE-2024-26214 critical
- CVE-2024-26239 critical
- CVE-2024-26212 critical
- CVE-2024-26250 high
- CVE-2024-28919 high
KB list
- 5036899
- 5036909
- 5036910
- 5036896
- 5036925
- 5036893
- 5036892
- 5036894
- 5037765
- 5037768
- 5037788
- 5037763
- 5037781
- 5037782
- 5037771
- 5044280
- 5044285
- 5044288
- 5044281
- 5044284
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!