Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, bypass security restrictions, cause denial of service, gain privileges, spoof user interface.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability can be exploited remotely to bypass security restrictions.
- A denial of service vulnerability in HTTP.sys can be exploited remotely to cause denial of service.
- A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Defender Credential Guard can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Secure Boot can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in DHCP Server Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Cryptographic Services can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Kerberos can be exploited remotely to cause denial of service.
- A spoofing vulnerability in Proxy Driver can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Microsoft Install Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows rndismp6.sys can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Local Security Authority Subsystem Service can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Telephony Server can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Update Stack can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Brokering File System can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows USB Print Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in libarchive can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Microsoft Virtual Machine Bus (VMBus) can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Distributed File System (DFS) can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft WDAC OLE DB Provider for SQL Server can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows SMB can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows CSC Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Storage can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Authentication can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Cryptographic Services can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Windows Distributed File System (DFS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows File Server Resource Management Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Mobile Hotspot can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in SmartScreen Prompt can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft WDAC SQL Server ODBC Driver can be exploited remotely to execute arbitrary code.
Первичный источник обнаружения
- CVE-2024-26255
CVE-2024-26227
CVE-2024-23593
CVE-2024-26219
CVE-2024-26215
CVE-2024-26237
CVE-2024-26172
CVE-2024-28900
CVE-2022-0001
CVE-2024-26168
CVE-2024-28921
CVE-2024-26195
CVE-2024-29050
CVE-2024-26179
CVE-2024-28901
CVE-2024-26183
CVE-2024-28923
CVE-2024-26234
CVE-2024-26158
CVE-2024-28903
CVE-2024-20678
CVE-2024-26253
CVE-2024-26202
CVE-2024-29064
CVE-2024-26180
CVE-2024-20665
CVE-2024-28925
CVE-2024-26208
CVE-2024-26209
CVE-2024-26242
CVE-2024-26175
CVE-2024-26252
CVE-2024-28898
CVE-2024-26235
CVE-2024-26231
CVE-2024-28924
CVE-2024-28907
CVE-2024-28896
CVE-2024-26218
CVE-2024-26243
CVE-2024-26256
CVE-2024-26254
CVE-2024-28905
CVE-2024-26224
CVE-2024-26226
CVE-2024-26241
CVE-2024-26205
CVE-2024-26207
CVE-2024-26244
CVE-2024-26221
CVE-2024-28920
CVE-2024-20693
CVE-2024-26245
CVE-2024-20669
CVE-2024-26240
CVE-2024-26229
CVE-2024-29052
CVE-2024-29061
CVE-2024-29056
CVE-2024-26228
CVE-2024-28922
CVE-2024-26194
CVE-2024-29066
CVE-2024-29062
CVE-2024-26236
CVE-2024-26213
CVE-2024-26223
CVE-2024-26222
CVE-2024-26230
CVE-2024-26216
CVE-2024-26233
CVE-2024-26217
CVE-2024-26220
CVE-2024-28904
CVE-2024-26248
CVE-2024-26232
CVE-2024-23594
CVE-2024-28902
CVE-2024-26200
CVE-2024-26210
CVE-2024-21447
CVE-2024-28897
CVE-2024-26171
CVE-2024-26211
CVE-2024-29988
CVE-2024-26189
CVE-2024-26214
CVE-2024-26239
CVE-2024-26212
CVE-2024-26250
CVE-2024-28919
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
Список CVE
- CVE-2022-0001 high
- CVE-2024-26255 high
- CVE-2024-26227 warning
- CVE-2024-23593 high
- CVE-2024-26219 critical
- CVE-2024-26215 critical
- CVE-2024-26237 critical
- CVE-2024-26172 high
- CVE-2024-28900 high
- CVE-2024-26168 high
- CVE-2024-28921 high
- CVE-2024-26195 high
- CVE-2024-29050 critical
- CVE-2024-26179 critical
- CVE-2024-28901 high
- CVE-2024-26183 high
- CVE-2024-28923 high
- CVE-2024-26234 high
- CVE-2024-26158 warning
- CVE-2024-28903 high
- CVE-2024-20678 critical
- CVE-2024-26253 high
- CVE-2024-26202 high
- CVE-2024-29064 warning
- CVE-2024-26180 critical
- CVE-2024-20665 high
- CVE-2024-28925 critical
- CVE-2024-26208 high
- CVE-2024-26209 high
- CVE-2024-26242 high
- CVE-2024-26175 critical
- CVE-2024-26252 warning
- CVE-2024-28898 high
- CVE-2024-26235 critical
- CVE-2024-26231 high
- CVE-2024-28924 high
- CVE-2024-28907 critical
- CVE-2024-28896 critical
- CVE-2024-26218 critical
- CVE-2024-26243 high
- CVE-2024-26256 critical
- CVE-2024-26254 critical
- CVE-2024-28905 warning
- CVE-2024-26224 warning
- CVE-2024-26226 high
- CVE-2024-26241 critical
- CVE-2024-26205 critical
- CVE-2024-26207 high
- CVE-2024-26244 warning
- CVE-2024-26221 high
- CVE-2024-28920 critical
- CVE-2024-20693 critical
- CVE-2024-26245 critical
- CVE-2024-20669 high
- CVE-2024-26240 critical
- CVE-2024-26229 critical
- CVE-2024-29052 critical
- CVE-2024-29061 critical
- CVE-2024-29056 warning
- CVE-2024-26228 critical
- CVE-2024-28922 warning
- CVE-2024-26194 high
- CVE-2024-29066 high
- CVE-2024-29062 high
- CVE-2024-26236 high
- CVE-2024-26213 high
- CVE-2024-26223 high
- CVE-2024-26222 high
- CVE-2024-26230 critical
- CVE-2024-26216 high
- CVE-2024-26233 high
- CVE-2024-26217 high
- CVE-2024-26220 warning
- CVE-2024-28904 critical
- CVE-2024-26248 critical
- CVE-2024-26232 high
- CVE-2024-23594 high
- CVE-2024-28902 high
- CVE-2024-26200 critical
- CVE-2024-26210 critical
- CVE-2024-21447 critical
- CVE-2024-28897 high
- CVE-2024-26171 high
- CVE-2024-26211 warning
- CVE-2024-29988 critical
- CVE-2024-26189 warning
- CVE-2024-26214 critical
- CVE-2024-26239 critical
- CVE-2024-26212 critical
- CVE-2024-26250 high
- CVE-2024-28919 high
Список KB
- 5036899
- 5036909
- 5036910
- 5036896
- 5036925
- 5036893
- 5036892
- 5036894
- 5037765
- 5037768
- 5037788
- 5037763
- 5037781
- 5037782
- 5037771
- 5044280
- 5044285
- 5044288
- 5044281
- 5044284
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!