Описание
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, bypass security restrictions, execute arbitrary code, spoof user interface, gain privileges.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Secure Boot can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in DHCP Server Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Cryptographic Services can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Kerberos can be exploited remotely to cause denial of service.
- A spoofing vulnerability in Proxy Driver can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Microsoft Install Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows rndismp6.sys can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Local Security Authority Subsystem Service can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Telephony Server can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Distributed File System (DFS) can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft WDAC OLE DB Provider for SQL Server can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows CSC Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Authentication can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Cryptographic Services can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Windows Distributed File System (DFS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows File Server Resource Management Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft WDAC SQL Server ODBC Driver can be exploited remotely to execute arbitrary code.
Первичный источник обнаружения
- CVE-2024-26226
CVE-2024-26241
CVE-2024-26205
CVE-2024-26215
CVE-2024-26207
CVE-2024-26244
CVE-2024-20689
CVE-2024-20669
CVE-2024-28900
CVE-2024-26240
CVE-2022-0001
CVE-2024-26229
CVE-2024-29056
CVE-2024-29061
CVE-2024-26228
CVE-2024-26168
CVE-2024-28921
CVE-2024-26195
CVE-2024-29050
CVE-2024-26194
CVE-2024-28922
CVE-2024-29066
CVE-2024-29062
CVE-2024-26179
CVE-2024-28901
CVE-2024-20688
CVE-2024-26183
CVE-2024-28923
CVE-2024-26230
CVE-2024-26234
CVE-2024-26216
CVE-2024-26158
CVE-2024-28903
CVE-2024-20678
CVE-2024-26253
CVE-2024-26202
CVE-2024-26217
CVE-2024-26180
CVE-2024-20665
CVE-2024-28925
CVE-2024-26208
CVE-2024-26248
CVE-2024-26209
CVE-2024-28902
CVE-2024-26242
CVE-2024-26175
CVE-2024-26232
CVE-2024-26252
CVE-2024-26200
CVE-2024-26210
CVE-2024-28897
CVE-2024-26171
CVE-2024-26211
CVE-2024-28898
CVE-2024-26189
CVE-2024-26214
CVE-2024-28924
CVE-2024-26239
CVE-2024-26212
CVE-2024-26250
CVE-2024-28896
CVE-2024-28919
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-Server-2008
Список CVE
- CVE-2022-0001 high
- CVE-2024-26215 critical
- CVE-2024-28900 high
- CVE-2024-26168 high
- CVE-2024-28921 high
- CVE-2024-26195 high
- CVE-2024-29050 critical
- CVE-2024-26179 critical
- CVE-2024-28901 high
- CVE-2024-26183 high
- CVE-2024-28923 high
- CVE-2024-26234 high
- CVE-2024-26158 warning
- CVE-2024-28903 high
- CVE-2024-20678 critical
- CVE-2024-26253 high
- CVE-2024-26202 high
- CVE-2024-26180 critical
- CVE-2024-20665 high
- CVE-2024-28925 critical
- CVE-2024-26208 high
- CVE-2024-26209 high
- CVE-2024-26242 high
- CVE-2024-26175 critical
- CVE-2024-26252 warning
- CVE-2024-28898 high
- CVE-2024-28924 high
- CVE-2024-28896 critical
- CVE-2024-26226 high
- CVE-2024-26241 critical
- CVE-2024-26205 critical
- CVE-2024-26207 high
- CVE-2024-26244 warning
- CVE-2024-20669 high
- CVE-2024-26240 critical
- CVE-2024-26229 critical
- CVE-2024-29061 critical
- CVE-2024-29056 warning
- CVE-2024-26228 critical
- CVE-2024-28922 warning
- CVE-2024-26194 high
- CVE-2024-29066 high
- CVE-2024-29062 high
- CVE-2024-26230 critical
- CVE-2024-26216 high
- CVE-2024-26217 high
- CVE-2024-26248 critical
- CVE-2024-26232 high
- CVE-2024-28902 high
- CVE-2024-26200 critical
- CVE-2024-26210 critical
- CVE-2024-28897 high
- CVE-2024-26171 high
- CVE-2024-26211 warning
- CVE-2024-26189 warning
- CVE-2024-26214 critical
- CVE-2024-26239 critical
- CVE-2024-26212 critical
- CVE-2024-26250 high
- CVE-2024-28919 high
- CVE-2024-20689 high
- CVE-2024-20688 high
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!