Описание
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, obtain sensitive information, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A denial of service vulnerability in Windows Trust Verification API can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Event Tracing can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Remote Procedure Call can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows PKU2U can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows TCP/IP can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows TCP/IP can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Address Book can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Fax Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Local Spooler can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Windows VMSwitch can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Microsoft Windows can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows Backup Engine can be exploited remotely to obtain sensitive information.
Первичный источник обнаружения
- CVE-2021-24080
CVE-2021-24103
CVE-2021-1734
CVE-2021-25195
CVE-2021-24086
CVE-2021-1727
CVE-2021-24102
CVE-2021-24094
CVE-2021-24078
CVE-2021-24083
CVE-2021-1722
CVE-2021-24074
CVE-2021-24088
CVE-2021-24077
CVE-2021-24076
CVE-2020-17162
CVE-2021-24079
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
Список CVE
- CVE-2021-24080 high
- CVE-2021-24103 critical
- CVE-2021-1734 critical
- CVE-2021-25195 critical
- CVE-2021-24086 critical
- CVE-2021-1727 critical
- CVE-2021-24102 critical
- CVE-2021-24094 critical
- CVE-2021-24076 high
- CVE-2021-24078 critical
- CVE-2021-24083 critical
- CVE-2021-24079 high
- CVE-2021-1722 critical
- CVE-2021-24074 critical
- CVE-2021-24088 critical
- CVE-2021-24077 critical
- CVE-2020-17162 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!