Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, spoof user interface, execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in NT OS Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A tampering vulnerability in Windows Remote Desktop Services can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft WDAC OLE DB provider for SQL Server can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft OpenSSH for Windows can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Mobile Broadband Driver can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Secure Kernel Mode can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Mobile Broadband Driver can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Kernel can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Kernel-Mode Driver can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Management Console can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Mariner can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Resume Extensible Firmware Interface can be exploited remotely to bypass security restrictions.
- A denial of service vulnerability in Windows Online Certificate Status Protocol (OCSP) Server can be exploited remotely to cause denial of service.
- A denial of service vulnerability in Microsoft Simple Certificate Enrollment Protocol can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Storage can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Kerberos can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Internet Small Computer Systems Interface (iSCSI) can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Shell can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Netlogon can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft ActiveX Data Objects can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Local Security Authority (LSA) can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Remote Registry Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Telephony Server can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Network Address Translation (NAT) can be exploited remotely to cause denial of service.
- A spoofing vulnerability in Windows Secure Channel can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Winlogon can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Remote Desktop Licensing Service can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Windows MSHTML Platform can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Sudo for Windows can be exploited remotely to spoof user interface.
- A security feature bypass vulnerability in Code Integrity Guard can be exploited remotely to bypass security restrictions.
- A denial of service vulnerability in BranchCache can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Cryptographic can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Scripting Engine can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Remote Desktop Protocol Server can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Speech Application Programming Interface (SAPI) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Windows Storage Port Driver can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Hyper-V can be exploited remotely to bypass security restrictions.
Первичный источник обнаружения
- CVE-2024-38129
CVE-2024-43511
CVE-2024-43553
CVE-2024-43535
CVE-2024-43501
CVE-2024-43456
CVE-2024-43519
CVE-2024-43615
CVE-2024-43537
CVE-2024-43516
CVE-2024-43555
CVE-2024-43536
CVE-2024-43520
CVE-2024-43554
CVE-2024-43611
CVE-2024-43572
CVE-2024-43453
CVE-2024-6197
CVE-2024-43575
CVE-2024-43526
CVE-2024-43521
CVE-2024-43528
CVE-2024-43534
CVE-2024-43523
CVE-2024-37982
CVE-2024-43545
CVE-2024-43549
CVE-2024-43570
CVE-2024-37976
CVE-2024-38261
CVE-2024-43541
CVE-2024-43538
CVE-2024-43563
CVE-2024-43599
CVE-2024-37983
CVE-2024-38212
CVE-2024-43509
CVE-2024-43551
CVE-2024-43544
CVE-2024-43547
CVE-2024-43502
CVE-2024-43515
CVE-2024-43514
CVE-2024-43527
CVE-2024-43552
CVE-2024-38124
CVE-2024-43589
CVE-2024-43557
CVE-2024-43608
CVE-2024-43525
CVE-2024-43581
CVE-2024-43517
CVE-2024-43567
CVE-2024-43522
CVE-2024-43592
CVE-2024-43512
CVE-2024-43533
CVE-2024-43593
CVE-2024-43564
CVE-2024-43561
CVE-2024-43532
CVE-2024-43518
CVE-2024-38265
CVE-2024-43543
CVE-2024-43565
CVE-2024-43556
CVE-2024-43550
CVE-2024-43583
CVE-2024-43524
CVE-2024-38262
CVE-2024-43573
CVE-2024-43540
CVE-2024-43558
CVE-2024-43571
CVE-2024-37979
CVE-2024-43508
CVE-2024-43585
CVE-2024-43506
CVE-2024-43546
CVE-2024-38029
CVE-2024-43559
CVE-2024-43584
CVE-2024-43607
CVE-2024-43582
CVE-2024-43500
CVE-2024-43574
CVE-2024-43529
CVE-2024-43513
CVE-2024-30092
CVE-2024-43560
CVE-2024-43562
CVE-2024-38149
CVE-2024-43542
CVE-2024-20659
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Windows-Server-2022
Список CVE
- CVE-2024-6197 critical
- CVE-2024-38124 critical
- CVE-2024-43553 high
- CVE-2024-43608 critical
- CVE-2024-43535 high
- CVE-2024-43501 critical
- CVE-2024-43456 high
- CVE-2024-43519 critical
- CVE-2024-43517 critical
- CVE-2024-43567 critical
- CVE-2024-43592 critical
- CVE-2024-43512 critical
- CVE-2024-43520 warning
- CVE-2024-43593 critical
- CVE-2024-43564 critical
- CVE-2024-43611 critical
- CVE-2024-43532 critical
- CVE-2024-38265 critical
- CVE-2024-43572 critical
- CVE-2024-43453 critical
- CVE-2024-43518 critical
- CVE-2024-43556 critical
- CVE-2024-43550 high
- CVE-2024-43583 critical
- CVE-2024-38262 critical
- CVE-2024-43521 critical
- CVE-2024-43573 critical
- CVE-2024-43534 high
- CVE-2024-37982 critical
- CVE-2024-43545 critical
- CVE-2024-43549 critical
- CVE-2024-37979 critical
- CVE-2024-43570 high
- CVE-2024-37976 high
- CVE-2024-38261 critical
- CVE-2024-43506 critical
- CVE-2024-43541 critical
- CVE-2024-43563 critical
- CVE-2024-43599 critical
- CVE-2024-37983 high
- CVE-2024-38212 critical
- CVE-2024-43607 critical
- CVE-2024-43509 critical
- CVE-2024-43544 critical
- CVE-2024-43515 critical
- CVE-2024-43547 high
- CVE-2024-43513 high
- CVE-2024-38149 critical
- CVE-2024-43560 critical
- CVE-2024-43514 critical
- CVE-2024-43589 critical
- CVE-2024-38129 high
- CVE-2024-43511 high
- CVE-2024-43615 high
- CVE-2024-43537 high
- CVE-2024-43516 critical
- CVE-2024-43555 high
- CVE-2024-43536 high
- CVE-2024-43554 high
- CVE-2024-43575 critical
- CVE-2024-43526 high
- CVE-2024-43528 critical
- CVE-2024-43523 high
- CVE-2024-43538 high
- CVE-2024-43551 critical
- CVE-2024-43502 high
- CVE-2024-43527 critical
- CVE-2024-43552 high
- CVE-2024-43557 high
- CVE-2024-43525 high
- CVE-2024-43581 high
- CVE-2024-43522 high
- CVE-2024-43533 critical
- CVE-2024-43561 high
- CVE-2024-43543 high
- CVE-2024-43565 critical
- CVE-2024-43524 high
- CVE-2024-43540 high
- CVE-2024-43558 high
- CVE-2024-43571 high
- CVE-2024-43508 high
- CVE-2024-43585 high
- CVE-2024-43546 high
- CVE-2024-38029 critical
- CVE-2024-43559 high
- CVE-2024-43584 critical
- CVE-2024-43582 critical
- CVE-2024-43500 high
- CVE-2024-43574 critical
- CVE-2024-43529 high
- CVE-2024-30092 critical
- CVE-2024-43562 critical
- CVE-2024-43542 high
- CVE-2024-20659 high
Список KB
- 5044293
- 5044286
- 5044280
- 5044277
- 5044285
- 5044273
- 5044288
- 5044281
- 5044284
- 5046633
- 5046616
- 5046615
- 5046613
- 5046618
- 5046696
- 5046612
- 5046665
- 5047621
- 5046698
- 5048667
- 5048661
- 5048703
- 5048652
- 5048685
- 5048794
- 5048653
- 5048654
- 5048671
- 5048800
- 5048676
- 5048695
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!