Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, obtain sensitive information.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Mobile Broadband Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Remote Desktop Services can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Input Method Editor (IME) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows PrintWorkflowUserSvc can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Wireless Wide Area Network Service (WwanSvc) can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Wireless Wide Area Network Service (WwanSvc) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in WmsRepair Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Virtualization-Based Security (VBS) Enclave can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Remote Desktop Gateway (RD Gateway) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Lightweight Directory Access Protocol (LDAP) Client can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Local Security Authority Subsystem Service (LSASS) can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Remote Desktop Services can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Mobile Broadband Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows File Explorer can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Task Scheduler can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows IP Routing Management Snapin can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Domain Name Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
Original advisories
- CVE-2024-49119
- CVE-2024-49104
- CVE-2024-49090
- CVE-2024-49077
- CVE-2024-49113
- CVE-2024-49106
- CVE-2024-49112
- CVE-2024-49127
- CVE-2024-49089
- CVE-2024-49079
- CVE-2024-49097
- CVE-2024-49099
- CVE-2024-49081
- CVE-2024-49107
- CVE-2024-49103
- CVE-2024-49094
- CVE-2024-49116
- CVE-2024-49122
- CVE-2024-49093
- CVE-2024-49121
- CVE-2024-49076
- CVE-2024-49129
- CVE-2024-49124
- CVE-2024-49110
- CVE-2024-49120
- CVE-2024-49095
- CVE-2024-49132
- CVE-2024-49126
- CVE-2024-49075
- CVE-2024-49114
- CVE-2024-49111
- CVE-2024-49125
- CVE-2024-49118
- CVE-2024-49102
- CVE-2024-49084
- CVE-2024-49087
- CVE-2024-49074
- CVE-2024-49078
- CVE-2024-49128
- CVE-2024-49082
- CVE-2024-49123
- CVE-2024-49098
- CVE-2024-49092
- CVE-2024-49072
- CVE-2024-49105
- CVE-2024-49101
- CVE-2024-49109
- CVE-2024-49080
- CVE-2024-49088
- CVE-2024-49096
- CVE-2024-49091
- CVE-2024-49086
- CVE-2024-49115
- CVE-2024-49138
- CVE-2024-49073
- CVE-2024-49117
- CVE-2024-49108
- CVE-2024-49085
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Remote-Desktop
- Microsoft-Windows-Server-2022
CVE list
- CVE-2024-49083 high
- CVE-2024-49119 high
- CVE-2024-49104 high
- CVE-2024-49090 high
- CVE-2024-49077 high
- CVE-2024-49113 high
- CVE-2024-49106 high
- CVE-2024-49112 critical
- CVE-2024-49127 high
- CVE-2024-49089 high
- CVE-2024-49079 high
- CVE-2024-49097 high
- CVE-2024-49099 warning
- CVE-2024-49081 high
- CVE-2024-49107 high
- CVE-2024-49103 warning
- CVE-2024-49094 high
- CVE-2024-49116 high
- CVE-2024-49122 high
- CVE-2024-49093 high
- CVE-2024-49121 high
- CVE-2024-49076 high
- CVE-2024-49129 high
- CVE-2024-49124 high
- CVE-2024-49110 high
- CVE-2024-49120 high
- CVE-2024-49095 high
- CVE-2024-49132 high
- CVE-2024-49126 high
- CVE-2024-49075 high
- CVE-2024-49114 high
- CVE-2024-49111 high
- CVE-2024-49125 high
- CVE-2024-49118 high
- CVE-2024-49102 high
- CVE-2024-49084 high
- CVE-2024-49087 warning
- CVE-2024-49074 high
- CVE-2024-49078 high
- CVE-2024-49128 high
- CVE-2024-49082 high
- CVE-2024-49123 high
- CVE-2024-49098 warning
- CVE-2024-49092 high
- CVE-2024-49072 high
- CVE-2024-49105 high
- CVE-2024-49101 high
- CVE-2024-49109 high
- CVE-2024-49080 high
- CVE-2024-49088 high
- CVE-2024-49096 high
- CVE-2024-49091 high
- CVE-2024-49086 high
- CVE-2024-49115 high
- CVE-2024-49138 high
- CVE-2024-49073 high
- CVE-2024-49117 high
- CVE-2024-49108 high
- CVE-2024-49085 high
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!