Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, obtain sensitive information.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Perception Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Win32 Kernel Subsystem can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Themes can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in DNS protocol can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Wi-Fi Driver can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Streaming Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Winlogon can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Storage can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Speech Application Programming Interface (SAPI) can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Cryptographic Services can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Distributed File System (DFS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Container Manager Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Event Trace Log File Parsing can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
Первичный источник обнаружения
- CVE-2023-50868
CVE-2024-30080
CVE-2024-30091
CVE-2024-35250
CVE-2024-30084
CVE-2024-30078
CVE-2024-30090
CVE-2024-30066
CVE-2024-30062
CVE-2024-30093
CVE-2024-30087
CVE-2024-30086
CVE-2024-30083
CVE-2024-30095
CVE-2024-30067
CVE-2024-30077
CVE-2024-30082
CVE-2024-30094
CVE-2024-30063
CVE-2024-30065
CVE-2024-30070
CVE-2024-35265
CVE-2024-30069
CVE-2024-30085
CVE-2024-30099
CVE-2024-30068
CVE-2024-30088
CVE-2024-30097
CVE-2024-30096
CVE-2024-30064
CVE-2024-30076
CVE-2024-30072
CVE-2024-30089
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
Список CVE
- CVE-2023-50868 warning
- CVE-2024-30080 critical
- CVE-2024-30091 critical
- CVE-2024-35250 critical
- CVE-2024-30084 high
- CVE-2024-30078 critical
- CVE-2024-30090 high
- CVE-2024-30066 high
- CVE-2024-30062 critical
- CVE-2024-30093 high
- CVE-2024-30087 critical
- CVE-2024-30086 critical
- CVE-2024-30083 critical
- CVE-2024-30095 critical
- CVE-2024-30067 high
- CVE-2024-30077 critical
- CVE-2024-30082 critical
- CVE-2024-30094 critical
- CVE-2024-30063 high
- CVE-2024-30065 high
- CVE-2024-30070 critical
- CVE-2024-35265 high
- CVE-2024-30069 warning
- CVE-2024-30085 critical
- CVE-2024-30099 high
- CVE-2024-30068 critical
- CVE-2024-30088 high
- CVE-2024-30097 critical
- CVE-2024-30096 high
- CVE-2024-30064 critical
- CVE-2024-30076 high
- CVE-2024-30072 critical
- CVE-2024-30089 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!