CERTFR-2024-AVI-0978
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Microsoft N/A Microsoft SQL Server 2017 pour systèmes x64 (GDR) versions antérieures à 14.0.2070.1
Microsoft N/A Microsoft Visual Studio 2022 version 17.6 antérieures à 17.6.21
Microsoft N/A Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.17928.20238
Microsoft N/A Microsoft Exchange Server 2019 Cumulative Update 13 versions antérieures à 15.02.1258.038
Microsoft N/A Microsoft PC Manager versions antérieures à 3.14.10.0
Microsoft N/A Greffon Python pour Visual Studio Code versions antérieures à 2024.18.2
Microsoft N/A Microsoft TorchGeo versions antérieures à 0.6.1
Microsoft N/A Microsoft SharePoint Server 2019 versions antérieures à 16.0.10416.20000
Microsoft N/A Microsoft Defender pour Endpoint pour Android versions antérieures à 1.0.7001.0101
Microsoft N/A Microsoft Defender pour Endpoint pour iOS versions antérieures à 1.1.58140101
Microsoft N/A Microsoft Visual Studio 2022 version 17.10 antérieures à 17.10.9
Microsoft N/A Microsoft SQL Server 2022 pour systèmes x64 (GDR) versions antérieures à 16.0.1135.2
Microsoft N/A Microsoft SQL Server 2019 pour systèmes x64 (GDR) versions antérieures à 15.0.2130.3
Microsoft N/A Microsoft Exchange Server 2019 Cumulative Update 14 versions antérieures à 15.02.1544.013
Microsoft N/A Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 (GDR) versions antérieures à 13.0.6455.2
Microsoft N/A Microsoft Exchange Server 2016 Cumulative Update 23 versions antérieures à 15.01.2507.043
Microsoft N/A Greffon SSH pour Visual Studio Code versions antérieures à 0.115.1
Microsoft N/A Microsoft SQL Server 2017 pour systèmes x64 (CU 31) versions antérieures à 14.0.3485.1
Microsoft N/A Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5474.1001
Microsoft N/A LightGBM versions antérieures à 4.6.0
Microsoft N/A Microsoft SQL Server 2022 pour systèmes x64 (CU 15) versions antérieures à 16.0.4155.4
Microsoft N/A Microsoft Visual Studio 2022 version 17.8 antérieures à 17.8.16
Microsoft N/A Microsoft Visual Studio 2022 version 17.11 antérieures à 17.11.6
Microsoft N/A Microsoft SQL Server 2019 pour systèmes x64 (CU 29) versions antérieures à 15.0.4410.1
References
Bulletin de sécurité Microsoft CVE-2024-48994 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49048 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-43498 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49051 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49043 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49014 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-43462 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49004 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49016 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49010 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49040 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-48998 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49018 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49005 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49050 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49044 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49000 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49003 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49008 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49009 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-38255 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-48995 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49011 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49013 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49017 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49015 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49012 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-48997 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-48996 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-43598 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49001 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49021 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-43459 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-43499 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49007 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49002 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49006 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-49049 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-48999 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-48993 2024-11-12 vendor-advisory
Bulletin de sécurité Microsoft CVE-2024-5535 2024-11-12 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 14.0.2070.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Visual Studio 2022 version 17.6 ant\u00e9rieures \u00e0 17.6.21",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.17928.20238",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Exchange Server 2019 Cumulative Update 13 versions ant\u00e9rieures \u00e0 15.02.1258.038",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft PC Manager versions ant\u00e9rieures \u00e0 3.14.10.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Greffon Python pour Visual Studio Code versions ant\u00e9rieures \u00e0 2024.18.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft TorchGeo versions ant\u00e9rieures \u00e0 0.6.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10416.20000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Defender pour Endpoint pour Android versions ant\u00e9rieures \u00e0 1.0.7001.0101",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Defender pour Endpoint pour iOS versions ant\u00e9rieures \u00e0 1.1.58140101",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Visual Studio 2022 version 17.10 ant\u00e9rieures \u00e0 17.10.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 16.0.1135.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 15.0.2130.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Exchange Server 2019 Cumulative Update 14 versions ant\u00e9rieures \u00e0 15.02.1544.013",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 (GDR) versions ant\u00e9rieures \u00e0 13.0.6455.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Exchange Server 2016 Cumulative Update 23 versions ant\u00e9rieures \u00e0 15.01.2507.043",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Greffon SSH pour Visual Studio Code versions ant\u00e9rieures \u00e0 0.115.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (CU 31) versions ant\u00e9rieures \u00e0 14.0.3485.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5474.1001",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "LightGBM versions ant\u00e9rieures \u00e0 4.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (CU 15) versions ant\u00e9rieures \u00e0 16.0.4155.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Visual Studio 2022 version 17.8 ant\u00e9rieures \u00e0 17.8.16",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Visual Studio 2022 version 17.11 ant\u00e9rieures \u00e0 17.11.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (CU 29) versions ant\u00e9rieures \u00e0 15.0.4410.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-48997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48997"
    },
    {
      "name": "CVE-2024-49002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49002"
    },
    {
      "name": "CVE-2024-48998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48998"
    },
    {
      "name": "CVE-2024-49050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49050"
    },
    {
      "name": "CVE-2024-48996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48996"
    },
    {
      "name": "CVE-2024-49013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49013"
    },
    {
      "name": "CVE-2024-49018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49018"
    },
    {
      "name": "CVE-2024-49012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49012"
    },
    {
      "name": "CVE-2024-49006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49006"
    },
    {
      "name": "CVE-2024-48999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48999"
    },
    {
      "name": "CVE-2024-49040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49040"
    },
    {
      "name": "CVE-2024-49010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49010"
    },
    {
      "name": "CVE-2024-43499",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43499"
    },
    {
      "name": "CVE-2024-43598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43598"
    },
    {
      "name": "CVE-2024-49049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49049"
    },
    {
      "name": "CVE-2024-49011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49011"
    },
    {
      "name": "CVE-2024-49043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49043"
    },
    {
      "name": "CVE-2024-49015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49015"
    },
    {
      "name": "CVE-2024-49009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49009"
    },
    {
      "name": "CVE-2024-49014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49014"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2024-38255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38255"
    },
    {
      "name": "CVE-2024-49003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49003"
    },
    {
      "name": "CVE-2024-48993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48993"
    },
    {
      "name": "CVE-2024-49008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49008"
    },
    {
      "name": "CVE-2024-49005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49005"
    },
    {
      "name": "CVE-2024-49021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49021"
    },
    {
      "name": "CVE-2024-49007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49007"
    },
    {
      "name": "CVE-2024-49051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49051"
    },
    {
      "name": "CVE-2024-49004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49004"
    },
    {
      "name": "CVE-2024-49044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49044"
    },
    {
      "name": "CVE-2024-49017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49017"
    },
    {
      "name": "CVE-2024-43462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43462"
    },
    {
      "name": "CVE-2024-48994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48994"
    },
    {
      "name": "CVE-2024-48995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48995"
    },
    {
      "name": "CVE-2024-49001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49001"
    },
    {
      "name": "CVE-2024-49000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49000"
    },
    {
      "name": "CVE-2024-43498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43498"
    },
    {
      "name": "CVE-2024-49048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49048"
    },
    {
      "name": "CVE-2024-49016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49016"
    },
    {
      "name": "CVE-2024-43459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43459"
    }
  ],
  "initial_release_date": "2024-11-13T00:00:00",
  "last_revision_date": "2024-11-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0978",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
  "vendor_advisories": [
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-48994",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48994"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49048",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49048"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-43498",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43498"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49051",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49051"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49043",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49043"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49014",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49014"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-43462",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43462"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49004",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49004"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49016",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49016"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49010",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49010"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49040",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49040"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-48998",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48998"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49018",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49018"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49005",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49005"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49050",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49050"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49044",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49044"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49000",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49000"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49003",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49003"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49008",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49008"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49009",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49009"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-38255",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38255"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-48995",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48995"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49011",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49011"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49013",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49013"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49017",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49017"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49015",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49015"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49012",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49012"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-48997",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48997"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-48996",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48996"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-43598",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43598"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49001",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49001"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49021",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49021"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-43459",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43459"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-43499",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43499"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49007",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49007"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49002",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49002"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49006",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49006"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-49049",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49049"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-48999",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48999"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-48993",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48993"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-5535",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-5535"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…