Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, cause denial of service, execute arbitrary code, spoof user interface, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Update Stack can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A denial of service vulnerability in Microsoft Virtual Hard Disk (VHDX) can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Microsoft Windows VMSwitch can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows USB Video Class System Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Telephony Service can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Registry can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows DNS can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Windows Secure Kernel Mode can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows KDC Proxy can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows NT OS Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Client-Side Caching can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Hyper-V Shared Virtual Disk can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows SMB can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Win32 Kernel Subsystem can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Telephony Service can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Defender Application Control (WDAC) can be exploited remotely to bypass security restrictions.
- A spoofing vulnerability in NTLM Hash Disclosure can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Windows SMBv3 Server can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Task Scheduler can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Active Directory Certificate Services can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Package Library Manager can be exploited remotely to obtain sensitive information.
Первичный источник обнаружения
- CVE-2024-43530
CVE-2024-43636
CVE-2024-38264
CVE-2024-43625
CVE-2024-43643
CVE-2024-43449
CVE-2024-43629
CVE-2024-43621
CVE-2024-43633
CVE-2024-43638
CVE-2024-43452
CVE-2024-43450
CVE-2024-43620
CVE-2024-43646
CVE-2024-43640
CVE-2024-43639
CVE-2024-43623
CVE-2024-43644
CVE-2024-43624
CVE-2024-43635
CVE-2024-43642
CVE-2024-43630
CVE-2024-49046
CVE-2024-43626
CVE-2024-43645
CVE-2024-43641
CVE-2024-43451
CVE-2024-43627
CVE-2024-43447
CVE-2024-49039
CVE-2024-43631
CVE-2024-43634
CVE-2024-43637
CVE-2024-43622
CVE-2024-49019
CVE-2024-43628
CVE-2024-38203
Эксплуатация
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Windows-Server-2022
Список CVE
- CVE-2024-43635 high
- CVE-2024-43636 high
- CVE-2024-43626 high
- CVE-2024-49046 high
- CVE-2024-43643 high
- CVE-2024-43449 high
- CVE-2024-43641 high
- CVE-2024-43621 high
- CVE-2024-43638 high
- CVE-2024-43451 high
- CVE-2024-43627 high
- CVE-2024-43452 high
- CVE-2024-43450 high
- CVE-2024-43620 high
- CVE-2024-43634 high
- CVE-2024-43639 critical
- CVE-2024-43637 high
- CVE-2024-43622 high
- CVE-2024-49019 high
- CVE-2024-43628 high
- CVE-2024-38203 high
- CVE-2024-43623 high
- CVE-2024-43644 high
- CVE-2024-43530 high
- CVE-2024-38264 high
- CVE-2024-43625 high
- CVE-2024-43629 high
- CVE-2024-43633 high
- CVE-2024-43646 high
- CVE-2024-43640 high
- CVE-2024-43624 high
- CVE-2024-43642 high
- CVE-2024-43630 high
- CVE-2024-43645 high
- CVE-2024-43447 high
- CVE-2024-49039 high
- CVE-2024-43631 high
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!