Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.832040
Kategorie:Windows : Microsoft Bulletins
Titel:Microsoft Windows Multiple Vulnerabilities (KB5025234)
Zusammenfassung:This host is missing a critical security; update according to Microsoft KB5025234
Beschreibung:Summary:
This host is missing a critical security
update according to Microsoft KB5025234

Vulnerability Insight:
Multiple flaws exist due to:

- A Remote Code Execution vulnerability in Microsoft PostScript and PCL6 Class Printer Driver.

- A Information Disclosure vulnerability in Remote Procedure Call Runtime.

- A Remote Code Execution vulnerability in Layer 2 Tunneling Protocol.

For more information about the vulnerabilities refer to Reference links.

Vulnerability Impact:
Successful exploitation will allow an
attacker to elevate privileges, execute arbitrary commands, disclose
information, bypass security restrictions, spoofing and conduct DoS
attacks.

Affected Software/OS:
- Microsoft Windows 10 for 32-bit Systems

- Microsoft Windows 10 for x64-based Systems

Solution:
The vendor has released updates. Please see
the references for more information.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2023-21729
Remote Procedure Call Runtime Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21729
Common Vulnerability Exposure (CVE) ID: CVE-2023-28302
Microsoft Message Queuing Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28302
Common Vulnerability Exposure (CVE) ID: CVE-2023-28298
Windows Kernel Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28298
Common Vulnerability Exposure (CVE) ID: CVE-2023-28293
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28293
http://packetstormsecurity.com/files/173135/Microsoft-Windows-11-22h2-Kernel-Privilege-Escalation.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-28276
Windows Group Policy Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28276
Common Vulnerability Exposure (CVE) ID: CVE-2023-28253
Windows Kernel Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28253
Common Vulnerability Exposure (CVE) ID: CVE-2023-28275
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28275
Common Vulnerability Exposure (CVE) ID: CVE-2023-28252
Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252
http://packetstormsecurity.com/files/174668/Windows-Common-Log-File-System-Driver-clfs.sys-Privilege-Escalation.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-28250
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28250
Common Vulnerability Exposure (CVE) ID: CVE-2023-28249
Windows Boot Manager Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28249
Common Vulnerability Exposure (CVE) ID: CVE-2023-28272
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28272
Common Vulnerability Exposure (CVE) ID: CVE-2023-28271
Windows Kernel Memory Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28271
Common Vulnerability Exposure (CVE) ID: CVE-2023-28269
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28269
Common Vulnerability Exposure (CVE) ID: CVE-2023-28267
Remote Desktop Protocol Client Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28267
Common Vulnerability Exposure (CVE) ID: CVE-2023-28266
Windows Common Log File System Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28266
Common Vulnerability Exposure (CVE) ID: CVE-2023-28243
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28243
Common Vulnerability Exposure (CVE) ID: CVE-2023-28241
Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28241
Common Vulnerability Exposure (CVE) ID: CVE-2023-28236
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28236
Common Vulnerability Exposure (CVE) ID: CVE-2023-28238
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28238
Common Vulnerability Exposure (CVE) ID: CVE-2023-28237
Windows Kernel Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28237
Common Vulnerability Exposure (CVE) ID: CVE-2023-28232
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28232
Common Vulnerability Exposure (CVE) ID: CVE-2023-28228
Windows Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28228
Common Vulnerability Exposure (CVE) ID: CVE-2023-28229
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28229
Common Vulnerability Exposure (CVE) ID: CVE-2023-28227
Windows Bluetooth Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28227
Common Vulnerability Exposure (CVE) ID: CVE-2023-28226
Windows Enroll Engine Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28226
Common Vulnerability Exposure (CVE) ID: CVE-2023-28225
Windows NTLM Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28225
Common Vulnerability Exposure (CVE) ID: CVE-2023-28224
Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28224
Common Vulnerability Exposure (CVE) ID: CVE-2023-28222
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28222
Common Vulnerability Exposure (CVE) ID: CVE-2023-28221
Windows Error Reporting Service Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28221
Common Vulnerability Exposure (CVE) ID: CVE-2023-28220
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28220
Common Vulnerability Exposure (CVE) ID: CVE-2023-28219
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28219
Common Vulnerability Exposure (CVE) ID: CVE-2023-28218
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28218
Common Vulnerability Exposure (CVE) ID: CVE-2023-28217
Windows Network Address Translation (NAT) Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28217
Common Vulnerability Exposure (CVE) ID: CVE-2023-28216
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28216
Common Vulnerability Exposure (CVE) ID: CVE-2023-24931
Windows Secure Channel Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24931
Common Vulnerability Exposure (CVE) ID: CVE-2023-24929
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24929
Common Vulnerability Exposure (CVE) ID: CVE-2023-24887
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24887
Common Vulnerability Exposure (CVE) ID: CVE-2023-24928
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24928
Common Vulnerability Exposure (CVE) ID: CVE-2023-24886
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24886
Common Vulnerability Exposure (CVE) ID: CVE-2023-24927
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24927
Common Vulnerability Exposure (CVE) ID: CVE-2023-24885
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24885
Common Vulnerability Exposure (CVE) ID: CVE-2023-24926
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24926
Common Vulnerability Exposure (CVE) ID: CVE-2023-24884
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24884
Common Vulnerability Exposure (CVE) ID: CVE-2023-24925
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24925
Common Vulnerability Exposure (CVE) ID: CVE-2023-24883
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24883
Common Vulnerability Exposure (CVE) ID: CVE-2023-24924
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24924
Common Vulnerability Exposure (CVE) ID: CVE-2023-24912
Windows Graphics Component Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24912
Common Vulnerability Exposure (CVE) ID: CVE-2023-21769
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21769
Common Vulnerability Exposure (CVE) ID: CVE-2023-21727
Remote Procedure Call Runtime Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21727
Common Vulnerability Exposure (CVE) ID: CVE-2023-21554
Microsoft Message Queuing Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554
CopyrightCopyright (C) 2023 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.