Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, obtain sensitive information.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Mobile Broadband Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Remote Desktop Services can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Input Method Editor (IME) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows PrintWorkflowUserSvc can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Wireless Wide Area Network Service (WwanSvc) can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Wireless Wide Area Network Service (WwanSvc) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in WmsRepair Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Virtualization-Based Security (VBS) Enclave can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Remote Desktop Gateway (RD Gateway) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Lightweight Directory Access Protocol (LDAP) Client can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Local Security Authority Subsystem Service (LSASS) can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Remote Desktop Services can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Mobile Broadband Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows File Explorer can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Task Scheduler can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows IP Routing Management Snapin can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Domain Name Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
Первичный источник обнаружения
- CVE-2024-49083
CVE-2024-49119
CVE-2024-49104
CVE-2024-49090
CVE-2024-49077
CVE-2024-49113
CVE-2024-49106
CVE-2024-49112
CVE-2024-49127
CVE-2024-49089
CVE-2024-49079
CVE-2024-49097
CVE-2024-49099
CVE-2024-49081
CVE-2024-49107
CVE-2024-49103
CVE-2024-49094
CVE-2024-49116
CVE-2024-49122
CVE-2024-49093
CVE-2024-49121
CVE-2024-49076
CVE-2024-49129
CVE-2024-49124
CVE-2024-49110
CVE-2024-49120
CVE-2024-49095
CVE-2024-49132
CVE-2024-49126
CVE-2024-49075
CVE-2024-49114
CVE-2024-49111
CVE-2024-49125
CVE-2024-49118
CVE-2024-49102
CVE-2024-49084
CVE-2024-49087
CVE-2024-49074
CVE-2024-49078
CVE-2024-49128
CVE-2024-49082
CVE-2024-49123
CVE-2024-49098
CVE-2024-49092
CVE-2024-49072
CVE-2024-49105
CVE-2024-49101
CVE-2024-49109
CVE-2024-49080
CVE-2024-49088
CVE-2024-49096
CVE-2024-49091
CVE-2024-49086
CVE-2024-49115
CVE-2024-49138
CVE-2024-49073
CVE-2024-49117
CVE-2024-49108
CVE-2024-49085
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Remote-Desktop
- Microsoft-Windows-Server-2022
Список CVE
- CVE-2024-49083 high
- CVE-2024-49119 high
- CVE-2024-49104 high
- CVE-2024-49090 high
- CVE-2024-49077 high
- CVE-2024-49113 high
- CVE-2024-49106 high
- CVE-2024-49112 critical
- CVE-2024-49127 high
- CVE-2024-49089 high
- CVE-2024-49079 high
- CVE-2024-49097 high
- CVE-2024-49099 warning
- CVE-2024-49081 high
- CVE-2024-49107 high
- CVE-2024-49103 warning
- CVE-2024-49094 high
- CVE-2024-49116 high
- CVE-2024-49122 high
- CVE-2024-49093 high
- CVE-2024-49121 high
- CVE-2024-49076 high
- CVE-2024-49129 high
- CVE-2024-49124 high
- CVE-2024-49110 high
- CVE-2024-49120 high
- CVE-2024-49095 high
- CVE-2024-49132 high
- CVE-2024-49126 high
- CVE-2024-49075 high
- CVE-2024-49114 high
- CVE-2024-49111 high
- CVE-2024-49125 high
- CVE-2024-49118 high
- CVE-2024-49102 high
- CVE-2024-49084 high
- CVE-2024-49087 warning
- CVE-2024-49074 high
- CVE-2024-49078 high
- CVE-2024-49128 high
- CVE-2024-49082 high
- CVE-2024-49123 high
- CVE-2024-49098 warning
- CVE-2024-49092 high
- CVE-2024-49072 high
- CVE-2024-49105 high
- CVE-2024-49101 high
- CVE-2024-49109 high
- CVE-2024-49080 high
- CVE-2024-49088 high
- CVE-2024-49096 high
- CVE-2024-49091 high
- CVE-2024-49086 high
- CVE-2024-49115 high
- CVE-2024-49138 high
- CVE-2024-49073 high
- CVE-2024-49117 high
- CVE-2024-49108 high
- CVE-2024-49085 high
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!