CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
93.0%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, gain privileges, spoof user interface, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2024-21341 high
CVE-2024-21365 critical
CVE-2024-21357 critical
CVE-2024-21342 critical
CVE-2024-21359 critical
CVE-2024-21368 critical
CVE-2024-21367 critical
CVE-2024-21349 critical
CVE-2024-21340 warning
CVE-2023-50387 critical
CVE-2024-21338 critical
CVE-2024-21304 warning
CVE-2024-21348 critical
CVE-2024-21339 high
CVE-2024-21360 critical
CVE-2024-21370 critical
CVE-2024-21353 critical
CVE-2024-21405 high
CVE-2024-21355 high
CVE-2024-21420 critical
CVE-2024-21358 critical
CVE-2024-21361 critical
CVE-2024-20684 high
CVE-2024-21369 critical
CVE-2024-21346 critical
CVE-2024-21406 critical
CVE-2024-21350 critical
CVE-2024-21345 critical
CVE-2024-21344 high
CVE-2024-21371 high
CVE-2024-21377 high
CVE-2024-21354 critical
CVE-2024-21356 high
CVE-2024-21391 critical
CVE-2024-21372 critical
CVE-2024-21343 critical
CVE-2024-21352 critical
CVE-2024-21375 critical
CVE-2024-21362 high
CVE-2024-21347 critical
CVE-2024-21366 critical
CVE-2024-21363 critical
CVE-2024-21351 critical
CVE-2024-21412 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
Loss of integrity. Exploitation of vulnerabilities with this impact can lead to partial system fault or system components connection disruption.
support.microsoft.com/kb/5034763
support.microsoft.com/kb/5034765
support.microsoft.com/kb/5034766
support.microsoft.com/kb/5034767
support.microsoft.com/kb/5034768
support.microsoft.com/kb/5034769
support.microsoft.com/kb/5034770
support.microsoft.com/kb/5034774
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20684
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21304
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21339
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21340
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21341
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21342
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21343
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21344
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21345
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21346
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21347
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21348
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21349
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21350
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21351
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21352
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21353
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21354
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21355
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21356
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21357
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21358
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21359
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21360
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21361
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21362
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21363
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21365
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21366
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21367
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21368
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21369
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21370
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21371
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21372
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21375
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21377
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21391
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21405
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21406
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21412
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21420
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-11/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2016/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2019/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/