8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.1%
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, cause denial of service, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2024-30010 critical
CVE-2024-29999 high
CVE-2024-29998 high
CVE-2024-30025 critical
CVE-2024-30015 critical
CVE-2024-30018 critical
CVE-2024-30009 critical
CVE-2024-30021 high
CVE-2024-30028 critical
CVE-2024-30019 high
CVE-2024-30039 high
CVE-2024-30031 critical
CVE-2024-30032 critical
CVE-2024-30004 high
CVE-2024-30024 critical
CVE-2024-30016 high
CVE-2024-30011 high
CVE-2024-29994 critical
CVE-2024-30049 critical
CVE-2024-30014 critical
CVE-2024-30005 high
CVE-2024-30003 high
CVE-2024-30027 critical
CVE-2024-29997 high
CVE-2024-30007 critical
CVE-2024-30051 critical
CVE-2024-30050 high
CVE-2024-30017 critical
CVE-2024-30038 critical
CVE-2024-30000 high
CVE-2024-30008 high
CVE-2024-30037 critical
CVE-2024-30012 high
CVE-2024-30022 critical
CVE-2024-29996 critical
CVE-2024-30040 critical
CVE-2024-30033 high
CVE-2024-30034 high
CVE-2024-30029 critical
CVE-2024-30035 critical
CVE-2024-26238 critical
CVE-2024-30006 critical
CVE-2024-30001 high
CVE-2024-30023 critical
CVE-2024-30002 high
CVE-2024-30036 high
CVE-2024-30020 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/5037763
support.microsoft.com/kb/5037765
support.microsoft.com/kb/5037768
support.microsoft.com/kb/5037770
support.microsoft.com/kb/5037771
support.microsoft.com/kb/5037781
support.microsoft.com/kb/5037782
support.microsoft.com/kb/5037788
support.microsoft.com/kb/5037848
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26238
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29994
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29996
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29997
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29998
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29999
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30000
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30001
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30002
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30003
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30004
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30005
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30006
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30007
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30008
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30009
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30010
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30011
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30012
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30014
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30015
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30016
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30017
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30018
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30019
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30020
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30021
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30022
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30023
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30024
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30025
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30027
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30028
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30029
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30031
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30032
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30033
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30034
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30035
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30036
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30037
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30038
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30039
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30049
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30050
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-11/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2016/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2019/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.1%