Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, spoof user interface, execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in NT OS Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A tampering vulnerability in Windows Remote Desktop Services can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft WDAC OLE DB provider for SQL Server can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft OpenSSH for Windows can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Mobile Broadband Driver can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Secure Kernel Mode can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Mobile Broadband Driver can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Kernel can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Kernel-Mode Driver can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Management Console can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Mariner can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Resume Extensible Firmware Interface can be exploited remotely to bypass security restrictions.
- A denial of service vulnerability in Windows Online Certificate Status Protocol (OCSP) Server can be exploited remotely to cause denial of service.
- A denial of service vulnerability in Microsoft Simple Certificate Enrollment Protocol can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Storage can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Kerberos can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Internet Small Computer Systems Interface (iSCSI) can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Shell can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Netlogon can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft ActiveX Data Objects can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Local Security Authority (LSA) can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Remote Registry Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Telephony Server can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Network Address Translation (NAT) can be exploited remotely to cause denial of service.
- A spoofing vulnerability in Windows Secure Channel can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Winlogon can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Remote Desktop Licensing Service can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Windows MSHTML Platform can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Sudo for Windows can be exploited remotely to spoof user interface.
- A security feature bypass vulnerability in Code Integrity Guard can be exploited remotely to bypass security restrictions.
- A denial of service vulnerability in BranchCache can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Cryptographic can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Scripting Engine can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Remote Desktop Protocol Server can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Speech Application Programming Interface (SAPI) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Windows Storage Port Driver can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Hyper-V can be exploited remotely to bypass security restrictions.
Original advisories
- CVE-2024-43511
- CVE-2024-43553
- CVE-2024-43535
- CVE-2024-43501
- CVE-2024-43456
- CVE-2024-43519
- CVE-2024-43615
- CVE-2024-43537
- CVE-2024-43516
- CVE-2024-43555
- CVE-2024-43536
- CVE-2024-43520
- CVE-2024-43554
- CVE-2024-43611
- CVE-2024-43572
- CVE-2024-43453
- CVE-2024-6197
- CVE-2024-43575
- CVE-2024-43526
- CVE-2024-43521
- CVE-2024-43528
- CVE-2024-43534
- CVE-2024-43523
- CVE-2024-37982
- CVE-2024-43545
- CVE-2024-43549
- CVE-2024-43570
- CVE-2024-37976
- CVE-2024-38261
- CVE-2024-43541
- CVE-2024-43538
- CVE-2024-43563
- CVE-2024-43599
- CVE-2024-37983
- CVE-2024-38212
- CVE-2024-43509
- CVE-2024-43551
- CVE-2024-43544
- CVE-2024-43547
- CVE-2024-43502
- CVE-2024-43515
- CVE-2024-43514
- CVE-2024-43527
- CVE-2024-43552
- CVE-2024-38124
- CVE-2024-43589
- CVE-2024-43557
- CVE-2024-43608
- CVE-2024-43525
- CVE-2024-43581
- CVE-2024-43517
- CVE-2024-43567
- CVE-2024-43522
- CVE-2024-43592
- CVE-2024-43512
- CVE-2024-43533
- CVE-2024-43593
- CVE-2024-43564
- CVE-2024-43561
- CVE-2024-43532
- CVE-2024-43518
- CVE-2024-38265
- CVE-2024-43543
- CVE-2024-43565
- CVE-2024-43556
- CVE-2024-43550
- CVE-2024-43583
- CVE-2024-43524
- CVE-2024-38262
- CVE-2024-43573
- CVE-2024-43540
- CVE-2024-43558
- CVE-2024-43571
- CVE-2024-37979
- CVE-2024-43508
- CVE-2024-43585
- CVE-2024-43506
- CVE-2024-43546
- CVE-2024-38029
- CVE-2024-43559
- CVE-2024-43584
- CVE-2024-43607
- CVE-2024-43582
- CVE-2024-43500
- CVE-2024-43574
- CVE-2024-43529
- CVE-2024-43513
- CVE-2024-30092
- CVE-2024-43560
- CVE-2024-43562
- CVE-2024-38149
- CVE-2024-43542
- CVE-2024-20659
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Windows-Server-2022
CVE list
- CVE-2024-6197 critical
- CVE-2024-38124 critical
- CVE-2024-43553 high
- CVE-2024-43608 critical
- CVE-2024-43535 high
- CVE-2024-43501 critical
- CVE-2024-43456 high
- CVE-2024-43519 critical
- CVE-2024-43517 critical
- CVE-2024-43567 critical
- CVE-2024-43592 critical
- CVE-2024-43512 critical
- CVE-2024-43520 warning
- CVE-2024-43593 critical
- CVE-2024-43564 critical
- CVE-2024-43611 critical
- CVE-2024-43532 critical
- CVE-2024-38265 critical
- CVE-2024-43572 critical
- CVE-2024-43453 critical
- CVE-2024-43518 critical
- CVE-2024-43556 critical
- CVE-2024-43550 high
- CVE-2024-43583 critical
- CVE-2024-38262 critical
- CVE-2024-43521 critical
- CVE-2024-43573 critical
- CVE-2024-43534 high
- CVE-2024-37982 critical
- CVE-2024-43545 critical
- CVE-2024-43549 critical
- CVE-2024-37979 critical
- CVE-2024-43570 high
- CVE-2024-37976 high
- CVE-2024-38261 critical
- CVE-2024-43506 critical
- CVE-2024-43541 critical
- CVE-2024-43563 critical
- CVE-2024-43599 critical
- CVE-2024-37983 high
- CVE-2024-38212 critical
- CVE-2024-43607 critical
- CVE-2024-43509 critical
- CVE-2024-43544 critical
- CVE-2024-43515 critical
- CVE-2024-43547 high
- CVE-2024-43513 high
- CVE-2024-38149 critical
- CVE-2024-43560 critical
- CVE-2024-43514 critical
- CVE-2024-43589 critical
- CVE-2024-38129 high
- CVE-2024-43511 high
- CVE-2024-43615 high
- CVE-2024-43537 high
- CVE-2024-43516 critical
- CVE-2024-43555 high
- CVE-2024-43536 high
- CVE-2024-43554 high
- CVE-2024-43575 critical
- CVE-2024-43526 high
- CVE-2024-43528 critical
- CVE-2024-43523 high
- CVE-2024-43538 high
- CVE-2024-43551 critical
- CVE-2024-43502 high
- CVE-2024-43527 critical
- CVE-2024-43552 high
- CVE-2024-43557 high
- CVE-2024-43525 high
- CVE-2024-43581 high
- CVE-2024-43522 high
- CVE-2024-43533 critical
- CVE-2024-43561 high
- CVE-2024-43543 high
- CVE-2024-43565 critical
- CVE-2024-43524 high
- CVE-2024-43540 high
- CVE-2024-43558 high
- CVE-2024-43571 high
- CVE-2024-43508 high
- CVE-2024-43585 high
- CVE-2024-43546 high
- CVE-2024-38029 critical
- CVE-2024-43559 high
- CVE-2024-43584 critical
- CVE-2024-43582 critical
- CVE-2024-43500 high
- CVE-2024-43574 critical
- CVE-2024-43529 high
- CVE-2024-30092 critical
- CVE-2024-43562 critical
- CVE-2024-43542 high
- CVE-2024-20659 high
KB list
- 5044293
- 5044286
- 5044280
- 5044277
- 5044285
- 5044273
- 5044288
- 5044281
- 5044284
- 5046633
- 5046616
- 5046615
- 5046613
- 5046618
- 5046696
- 5046612
- 5046665
- 5047621
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!