Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, obtain sensitive information.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Mobile Broadband Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Remote Desktop Services can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Input Method Editor (IME) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows PrintWorkflowUserSvc can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Wireless Wide Area Network Service (WwanSvc) can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Wireless Wide Area Network Service (WwanSvc) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in WmsRepair Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Virtualization-Based Security (VBS) Enclave can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Remote Desktop Gateway (RD Gateway) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Lightweight Directory Access Protocol (LDAP) Client can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Local Security Authority Subsystem Service (LSASS) can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Remote Desktop Services can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Mobile Broadband Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows File Explorer can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Task Scheduler can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows IP Routing Management Snapin can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Domain Name Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
Original advisories
- CVE-2024-49119
- CVE-2024-49104
- CVE-2024-49090
- CVE-2024-49077
- CVE-2024-49113
- CVE-2024-49106
- CVE-2024-49112
- CVE-2024-49127
- CVE-2024-49089
- CVE-2024-49079
- CVE-2024-49097
- CVE-2024-49099
- CVE-2024-49081
- CVE-2024-49107
- CVE-2024-49103
- CVE-2024-49094
- CVE-2024-49116
- CVE-2024-49122
- CVE-2024-49093
- CVE-2024-49121
- CVE-2024-49076
- CVE-2024-49129
- CVE-2024-49124
- CVE-2024-49110
- CVE-2024-49120
- CVE-2024-49095
- CVE-2024-49132
- CVE-2024-49126
- CVE-2024-49075
- CVE-2024-49114
- CVE-2024-49111
- CVE-2024-49125
- CVE-2024-49118
- CVE-2024-49102
- CVE-2024-49084
- CVE-2024-49087
- CVE-2024-49074
- CVE-2024-49078
- CVE-2024-49128
- CVE-2024-49082
- CVE-2024-49123
- CVE-2024-49098
- CVE-2024-49092
- CVE-2024-49072
- CVE-2024-49105
- CVE-2024-49101
- CVE-2024-49109
- CVE-2024-49080
- CVE-2024-49088
- CVE-2024-49096
- CVE-2024-49091
- CVE-2024-49086
- CVE-2024-49115
- CVE-2024-49138
- CVE-2024-49073
- CVE-2024-49117
- CVE-2024-49108
- CVE-2024-49085
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Remote-Desktop
- Microsoft-Windows-Server-2022
CVE list
- CVE-2024-49083 high
- CVE-2024-49119 critical
- CVE-2024-49104 critical
- CVE-2024-49090 critical
- CVE-2024-49077 high
- CVE-2024-49113 critical
- CVE-2024-49106 critical
- CVE-2024-49112 critical
- CVE-2024-49127 critical
- CVE-2024-49089 high
- CVE-2024-49079 critical
- CVE-2024-49097 high
- CVE-2024-49099 warning
- CVE-2024-49081 high
- CVE-2024-49107 high
- CVE-2024-49103 warning
- CVE-2024-49094 high
- CVE-2024-49116 critical
- CVE-2024-49122 critical
- CVE-2024-49093 critical
- CVE-2024-49121 critical
- CVE-2024-49076 critical
- CVE-2024-49129 critical
- CVE-2024-49124 critical
- CVE-2024-49110 high
- CVE-2024-49120 critical
- CVE-2024-49095 high
- CVE-2024-49132 critical
- CVE-2024-49126 critical
- CVE-2024-49075 critical
- CVE-2024-49114 critical
- CVE-2024-49111 high
- CVE-2024-49125 critical
- CVE-2024-49118 critical
- CVE-2024-49102 critical
- CVE-2024-49084 high
- CVE-2024-49087 warning
- CVE-2024-49074 critical
- CVE-2024-49078 high
- CVE-2024-49128 critical
- CVE-2024-49082 high
- CVE-2024-49123 critical
- CVE-2024-49098 warning
- CVE-2024-49092 high
- CVE-2024-49072 critical
- CVE-2024-49105 critical
- CVE-2024-49101 high
- CVE-2024-49109 high
- CVE-2024-49080 critical
- CVE-2024-49088 critical
- CVE-2024-49096 critical
- CVE-2024-49091 high
- CVE-2024-49086 critical
- CVE-2024-49115 critical
- CVE-2024-49138 critical
- CVE-2024-49073 high
- CVE-2024-49117 critical
- CVE-2024-49108 critical
- CVE-2024-49085 critical
KB list
- 5048667
- 5048661
- 5048703
- 5048652
- 5048685
- 5048794
- 5048653
- 5048654
- 5048671
- 5048800
- 5049993
- 5050009
- 5049984
- 5050008
- 5049983
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!