Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, obtain sensitive information.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Mobile Broadband Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Remote Desktop Services can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Input Method Editor (IME) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows PrintWorkflowUserSvc can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Wireless Wide Area Network Service (WwanSvc) can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Wireless Wide Area Network Service (WwanSvc) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in WmsRepair Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Virtualization-Based Security (VBS) Enclave can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Remote Desktop Gateway (RD Gateway) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Lightweight Directory Access Protocol (LDAP) Client can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Local Security Authority Subsystem Service (LSASS) can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Remote Desktop Services can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Mobile Broadband Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows File Explorer can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Task Scheduler can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows IP Routing Management Snapin can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Domain Name Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
Первичный источник обнаружения
- CVE-2024-49083
CVE-2024-49119
CVE-2024-49104
CVE-2024-49090
CVE-2024-49077
CVE-2024-49113
CVE-2024-49106
CVE-2024-49112
CVE-2024-49127
CVE-2024-49089
CVE-2024-49079
CVE-2024-49097
CVE-2024-49099
CVE-2024-49081
CVE-2024-49107
CVE-2024-49103
CVE-2024-49094
CVE-2024-49116
CVE-2024-49122
CVE-2024-49093
CVE-2024-49121
CVE-2024-49076
CVE-2024-49129
CVE-2024-49124
CVE-2024-49110
CVE-2024-49120
CVE-2024-49095
CVE-2024-49132
CVE-2024-49126
CVE-2024-49075
CVE-2024-49114
CVE-2024-49111
CVE-2024-49125
CVE-2024-49118
CVE-2024-49102
CVE-2024-49084
CVE-2024-49087
CVE-2024-49074
CVE-2024-49078
CVE-2024-49128
CVE-2024-49082
CVE-2024-49123
CVE-2024-49098
CVE-2024-49092
CVE-2024-49072
CVE-2024-49105
CVE-2024-49101
CVE-2024-49109
CVE-2024-49080
CVE-2024-49088
CVE-2024-49096
CVE-2024-49091
CVE-2024-49086
CVE-2024-49115
CVE-2024-49138
CVE-2024-49073
CVE-2024-49117
CVE-2024-49108
CVE-2024-49085
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Remote-Desktop
- Microsoft-Windows-Server-2022
Список CVE
- CVE-2024-49083 high
- CVE-2024-49119 critical
- CVE-2024-49104 critical
- CVE-2024-49090 critical
- CVE-2024-49077 high
- CVE-2024-49113 critical
- CVE-2024-49106 critical
- CVE-2024-49112 critical
- CVE-2024-49127 critical
- CVE-2024-49089 high
- CVE-2024-49079 critical
- CVE-2024-49097 high
- CVE-2024-49099 warning
- CVE-2024-49081 high
- CVE-2024-49107 high
- CVE-2024-49103 warning
- CVE-2024-49094 high
- CVE-2024-49116 critical
- CVE-2024-49122 critical
- CVE-2024-49093 critical
- CVE-2024-49121 critical
- CVE-2024-49076 critical
- CVE-2024-49129 critical
- CVE-2024-49124 critical
- CVE-2024-49110 high
- CVE-2024-49120 critical
- CVE-2024-49095 high
- CVE-2024-49132 critical
- CVE-2024-49126 critical
- CVE-2024-49075 critical
- CVE-2024-49114 critical
- CVE-2024-49111 high
- CVE-2024-49125 critical
- CVE-2024-49118 critical
- CVE-2024-49102 critical
- CVE-2024-49084 high
- CVE-2024-49087 warning
- CVE-2024-49074 critical
- CVE-2024-49078 high
- CVE-2024-49128 critical
- CVE-2024-49082 high
- CVE-2024-49123 critical
- CVE-2024-49098 warning
- CVE-2024-49092 high
- CVE-2024-49072 critical
- CVE-2024-49105 critical
- CVE-2024-49101 high
- CVE-2024-49109 high
- CVE-2024-49080 critical
- CVE-2024-49088 critical
- CVE-2024-49096 critical
- CVE-2024-49091 high
- CVE-2024-49086 critical
- CVE-2024-49115 critical
- CVE-2024-49138 critical
- CVE-2024-49073 high
- CVE-2024-49117 critical
- CVE-2024-49108 critical
- CVE-2024-49085 critical
Список KB
- 5048667
- 5048661
- 5048703
- 5048652
- 5048685
- 5048794
- 5048653
- 5048654
- 5048671
- 5048800
- 5049993
- 5050009
- 5049984
- 5050008
- 5049983
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!