2.1 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
39.2%
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, bypass security restrictions, execute arbitrary code, spoof user interface, gain privileges.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2022-0001 high
CVE-2024-26215 critical
CVE-2024-28900 high
CVE-2024-26168 high
CVE-2024-28921 high
CVE-2024-26195 high
CVE-2024-29050 critical
CVE-2024-26179 critical
CVE-2024-28901 high
CVE-2024-26183 high
CVE-2024-28923 high
CVE-2024-26234 high
CVE-2024-26158 warning
CVE-2024-28903 high
CVE-2024-20678 critical
CVE-2024-26253 high
CVE-2024-26202 high
CVE-2024-26180 critical
CVE-2024-20665 high
CVE-2024-28925 critical
CVE-2024-26208 high
CVE-2024-26209 high
CVE-2024-26242 high
CVE-2024-26175 critical
CVE-2024-26252 warning
CVE-2024-28898 high
CVE-2024-28924 high
CVE-2024-28896 critical
CVE-2024-26226 high
CVE-2024-26241 critical
CVE-2024-26205 critical
CVE-2024-26207 high
CVE-2024-26244 warning
CVE-2024-20669 high
CVE-2024-26240 critical
CVE-2024-26229 critical
CVE-2024-29061 critical
CVE-2024-29056 warning
CVE-2024-26228 critical
CVE-2024-28922 warning
CVE-2024-26194 high
CVE-2024-29066 high
CVE-2024-29062 high
CVE-2024-26230 critical
CVE-2024-26216 high
CVE-2024-26217 high
CVE-2024-26248 critical
CVE-2024-26232 high
CVE-2024-28902 high
CVE-2024-26200 critical
CVE-2024-26210 critical
CVE-2024-28897 high
CVE-2024-26171 high
CVE-2024-26211 warning
CVE-2024-26189 warning
CVE-2024-26214 critical
CVE-2024-26239 critical
CVE-2024-26212 critical
CVE-2024-26250 high
CVE-2024-28919 high
CVE-2024-20689 high
CVE-2024-20688 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/5036922
support.microsoft.com/kb/5036932
support.microsoft.com/kb/5036950
support.microsoft.com/kb/5036960
support.microsoft.com/kb/5036967
support.microsoft.com/kb/5036969
support.microsoft.com/kb/5037823
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0001
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20665
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20669
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20678
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20688
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20689
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26158
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26168
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26171
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26175
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26179
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26180
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26183
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26189
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26194
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26195
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26200
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26202
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26205
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26207
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26208
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26209
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26210
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26211
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26212
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26214
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26215
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26216
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26217
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26226
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26228
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26229
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26230
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26232
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26234
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26239
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26240
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26241
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26242
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26244
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26248
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26250
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26252
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26253
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28896
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28897
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28898
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28900
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28901
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28902
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28903
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28919
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28921
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28922
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28923
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28924
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28925
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29050
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29056
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29061
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29062
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29066
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
2.1 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
39.2%