Microsoft Ürünleri Güvenlik Açığı Bülteni
- CVE-2024-29059 .NET Framework Information Disclosure Vulnerability
The following corrections have been made in the Security Updates table: 1) Removed .NET Framework 3.5 and 4.7.2 on Windows 10 version 1809 for ARM-based systems, .NET Framework 3.5 and 4.7/4.7.1/4.7.2 on Windows 10 version 1607 as these versions are not affected by this vulnerability. 2) Added .NET Framework 3.5 & 4.8 on Windows 10 version 1809 and Windows Server 2019, .NET Framework 3.5 and 4.7.2 on Windows 10 version 1607. Customers whose systems are configured to receive automatic updates do not need to take any further action. 3) Corrected Download and Article links.
- CVE-2023-24948 Windows Bluetooth Driver Elevation of Privilege Vulnerability
Added an acknowledgement. This is an informational change only.
- Chromium: CVE-2024-4368 Use after free in Dawn
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-4331 Use after free in Picture In Picture
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-4060 Use after free in Dawn
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-4059 Out of bounds read in V8 API
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-4058 Type Confusion in ANGLE
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- CVE-2024-26198 Microsoft Exchange Server Remote Code Execution Vulnerability
Microsoft is announcing the release of a new version of the Microsoft Exchange Server updates to address all known issues that were identified in the March 2024 Security Updates. Microsoft strongly recommends installing these new updates to address the vulnerability identified by CVE-2024-26198.
- CVE-2024-29991 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
Information published.
- Chromium: CVE-2024-3847 Insufficient policy enforcement in WebUI
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3845 Inappropriate implementation in Network
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3843 Insufficient data validation in Downloads
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3840 Insufficient policy enforcement in Site Isolation
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3839 Out of bounds read in Fonts
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3838 Inappropriate implementation in Autofill
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3837 Use after free in QUIC
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3834 Use after free in Downloads
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3914 Use after free in V8
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3833 Object corruption in WebAssembly
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3832 Object corruption in V8
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- CVE-2024-29048 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28929 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28940 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28932 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28930 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28939 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28908 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-29045 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-29047 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-29043 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28945 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28942 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28914 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28906 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-29986 Microsoft Edge for Android (Chromium-based) Information Disclosure Vulnerability
Information published.
- CVE-2024-28926 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28912 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28936 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-21409 .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
Added an FAQ to indicate that for .NET 7.0 and .NET 8.0., Windows is the only operating system affected by this vulnerability. For more information see [Microsoft Security Advisory CVE-2024-21409 | .NET Elevation of Privilege Vulnerability](https://github.com/dotnet/announcements/issues/303). This is an informational change only.
- CVE-2024-28934 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28911 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28937 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28933 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28931 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28935 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28943 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28938 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-29044 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28941 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28915 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28944 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-29983 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-29046 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-29985 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-29982 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28913 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-29984 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28909 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-29987 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
Information published.
- CVE-2024-28927 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-28910 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
Corrected Cumulative Update version numbers and reference KB numbers in the FAQ: “There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?” These are informational changes only.
- CVE-2024-26257 Microsoft Excel Remote Code Execution Vulnerability
Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the [Release Notes](https://go.microsoft.com/fwlink/p/?linkid=831049) for more information and download links.
- Chromium: CVE-2024-3157 Out of bounds write in Compositing
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3516 Heap buffer overflow in ANGLE
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-3515 Use after free in Dawn
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- CVE-2024-29055 Microsoft Defender for IoT Elevation of Privilege Vulnerability
Added an FAQ. This is an information change only.
- CVE-2024-29053 Microsoft Defender for IoT Remote Code Execution Vulnerability
Added an FAQ. This is an information change only.
- CVE-2024-26234 Proxy Driver Spoofing Vulnerability
Added acknowledgements. This is an informational change only.
- CVE-2024-21324 Microsoft Defender for IoT Elevation of Privilege Vulnerability
Added an FAQ. This is an information change only.
- CVE-2024-21323 Microsoft Defender for IoT Remote Code Execution Vulnerability
Added an FAQ. This is an information change only.
- CVE-2024-21322 Microsoft Defender for IoT Remote Code Execution Vulnerability
Added FAQ information. This is an informational change only.
- CVE-2022-0001 Intel: CVE-2022-0001 Branch History Injection
Updated CWE value. This is an informational change only.
- CVE-2024-29054 Microsoft Defender for IoT Elevation of Privilege Vulnerability
Added an FAQ. This is an information change only.
- CVE-2024-26231 Windows DNS Server Remote Code Execution Vulnerability
Information published.
- CVE-2024-26218 Windows Kernel Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26222 Windows DNS Server Remote Code Execution Vulnerability
Information published.
- CVE-2024-26175 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26194 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26245 Windows SMB Elevation of Privilege Vulnerability
Information published.
- ADV990001 Latest Servicing Stack Updates
Advisory updated to announce new versions of Servicing Stack Updates are available. Please see the FAQ for details.
- CVE-2024-28897 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-28904 Microsoft Brokering File System Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26240 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-28924 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26230 Windows Telephony Server Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26226 Windows Distributed File System (DFS) Information Disclosure Vulnerability
Information published.
- CVE-2024-26216 Windows File Server Resource Management Service Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26248 Windows Kerberos Elevation of Privilege Vulnerability
Information published.
- CVE-2024-28917 Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26236 Windows Update Stack Elevation of Privilege Vulnerability
Information published.
- CVE-2024-29056 Windows Authentication Elevation of Privilege Vulnerability
Information published.
- CVE-2024-29988 SmartScreen Prompt Security Feature Bypass Vulnerability
Information published.
- CVE-2024-29062 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26168 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-29989 Azure Monitor Agent Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26183 Windows Kerberos Denial of Service Vulnerability
Information published.
- CVE-2024-29993 Azure CycleCloud Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26202 DHCP Server Service Remote Code Execution Vulnerability
Information published.
- CVE-2024-26172 Windows DWM Core Library Information Disclosure Vulnerability
Information published.
- CVE-2024-26220 Windows Mobile Hotspot Information Disclosure Vulnerability
Information published.
- CVE-2024-26179 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Information published.
- CVE-2024-26224 Windows DNS Server Remote Code Execution Vulnerability
Information published.
- CVE-2024-26200 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Information published.
- CVE-2024-26241 Win32k Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26205 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Information published.
- CVE-2024-26229 Windows CSC Service Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26158 Microsoft Install Service Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26242 Windows Telephony Server Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26232 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
Information published.
- CVE-2024-26214 Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability
Information published.
- CVE-2024-28920 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-29990 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
Information published.
- CVE-2024-28922 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-20689 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-28921 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26171 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26208 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
Information published.
- CVE-2024-26180 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-28923 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26189 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-28896 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26195 DHCP Server Service Remote Code Execution Vulnerability
Information published.
- CVE-2024-28898 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26209 Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
Information published.
- CVE-2024-28901 Windows Remote Access Connection Manager Information Disclosure Vulnerability
Information published.
- CVE-2024-26219 HTTP.sys Denial of Service Vulnerability
Information published.
- CVE-2024-28902 Windows Remote Access Connection Manager Information Disclosure Vulnerability
Information published.
- CVE-2024-26221 Windows DNS Server Remote Code Execution Vulnerability
Information published.
- CVE-2024-28903 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26223 Windows DNS Server Remote Code Execution Vulnerability
Information published.
- CVE-2024-28905 Microsoft Brokering File System Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26227 Windows DNS Server Remote Code Execution Vulnerability
Information published.
- CVE-2024-29050 Windows Cryptographic Services Remote Code Execution Vulnerability
Information published.
- CVE-2024-26233 Windows DNS Server Remote Code Execution Vulnerability
Information published.
- CVE-2024-29063 Azure AI Search Information Disclosure Vulnerability
Information published.
- CVE-2024-26243 Windows USB Print Driver Elevation of Privilege Vulnerability
Information published.
- CVE-2024-29064 Windows Hyper-V Denial of Service Vulnerability
Information published.
- CVE-2024-26210 Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
Information published.
- CVE-2024-29066 Windows Distributed File System (DFS) Remote Code Execution Vulnerability
Information published.
- CVE-2024-26235 Windows Update Stack Elevation of Privilege Vulnerability
Information published.
- CVE-2024-20685 Azure Private 5G Core Denial of Service Vulnerability
Information published.
- CVE-2024-26237 Windows Defender Credential Guard Elevation of Privilege Vulnerability
Information published.
- CVE-2024-23593 Lenovo: CVE-2024-23593 Zero Out Boot Manager and drop to UEFI Shell
Information published.
- CVE-2024-26244 Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
Information published.
- CVE-2024-23594 Lenovo: CVE-2024-23594 Stack buffer overflow in Lenovo system recovery boot manager
Corrected CVE title. This is an informational change only.
- CVE-2024-26207 Windows Remote Access Connection Manager Information Disclosure Vulnerability
Information published.
- CVE-2024-26212 DHCP Server Service Denial of Service Vulnerability
Information published.
- CVE-2024-26211 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26193 Azure Migrate Remote Code Execution Vulnerability
Information published.
- CVE-2024-26213 Microsoft Brokering File System Elevation of Privilege Vulnerability
Information published.
- CVE-2024-20688 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26215 DHCP Server Service Denial of Service Vulnerability
Information published.
- CVE-2024-20693 Windows Kernel Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26217 Windows Remote Access Connection Manager Information Disclosure Vulnerability
Information published.
- CVE-2024-20669 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26228 Windows Cryptographic Services Security Feature Bypass Vulnerability
Information published.
- CVE-2024-20665 BitLocker Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26239 Windows Telephony Server Elevation of Privilege Vulnerability
Information published.
- CVE-2024-20678 Remote Procedure Call Runtime Remote Code Execution Vulnerability
Information published.
- CVE-2024-26251 Microsoft SharePoint Server Spoofing Vulnerability
Information published.
- CVE-2024-21424 Azure Compute Gallery Elevation of Privilege Vulnerability
Information published.
- CVE-2024-28925 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-21447 Windows Authentication Elevation of Privilege Vulnerability
Information published.
- CVE-2024-28900 Windows Remote Access Connection Manager Information Disclosure Vulnerability
Information published.
- CVE-2024-26250 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-28907 Microsoft Brokering File System Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26252 Windows rndismp6.sys Remote Code Execution Vulnerability
Information published.
- CVE-2024-29052 Windows Storage Elevation of Privilege Vulnerability
Information published.
- CVE-2024-26253 Windows rndismp6.sys Remote Code Execution Vulnerability
Information published.
- CVE-2024-29061 Secure Boot Security Feature Bypass Vulnerability
Information published.
- CVE-2024-26254 Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability
Information published.
- CVE-2024-20670 Outlook for Windows Spoofing Vulnerability
Information published.
Arif Akyüz
Bilgi Teknolojileri
Sistem Network Yöneticisi
ve Siber Güvenlik Uzmanı
[email protected]
- .bak sql dosyası açma ve import etme işlemi
- .NET Framework 3.5 yüklemesi başarısız oluyor
- 1. SİBER GÜVENLİK – HEDEF BELİRLEME
- 2. SİBER GÜVENLİK – BİLGİ TOPLAMA
- 2024 Resmi Tatiller
- 2025 Resmi Tatiller
- 3. SİBER GÜVENLİK – TARAMA YAPMA
- 4. SİBER GÜVENLİK – YETKİ YÜKSELTME
- Açık Port Sorgulama CMD
- Active Directory – PDC Primary Active Directory Bulma Komutu
- Active Directory Computer Obje Silme Yetkisi
- Active Directory Güvenliği
- Active Directory Kullanıcı Oluşturma Yetkisi Verme
- Active Directory Silinmiş Nesneleri Kurtarma
- Active directory sunucularının saat ayarlarını dünya saatine göre senkronize etme
- Active Directory Unlock Account Permission
- Active Directory Zamana Dayalı Grup Üyeliği
- Active Directory’den BitLocker Kurtarma Parolası nasıl alınır
- AD üzerinde Kullanıcının Parolasını kim sıfırlamış
- Adobe Illustrator ile Vektörel Logo Nasıl Yapılır
- Adobe Illustrator Yazıyı Vektöre Çevirme
- ADS ile Google Reklam Verme
- Ağırlık ölçü birimleri
- Alfabe
- Alfanümerik Nedir?
- Amerika’da saat kaç?
- Anakart Modeli Nasıl Öğrenilir?
- Anydesk
- ARİF AKYÜZ – SİTE İÇERİĞİ
- ARP Nedir?
- ASN Kodu Nedir?
- Azure Active Directory
- Backup Policy
- Belirli Bir Süre Sonra Silinen Süreli Mail Gönderme
- Bilgisayar Model Bilgisi Değiştirme Windows
- Bilgisayara uygulanan Group policy görme komutu CMD
- Bilgisayara uygulanan Windows Updatelerin Listesini Çekme
- Bir Monitörün Karbon Ayak İzi
- Bitlocker Gpedit İle Devreye Alma İşlemi
- BitLocker ile USB Disk Şifreleme ve Yönetimi
- Biyometrik Fotoğraf Nedir?
- Bot nedir?
- Bu bilgisayar windows 11’i çalıştıramaz hatası çözümü
- C# XML Dosyası Veri Çekme, Ekleme, Silme, Güncelleme İşlemleri
- Çalışıyorum iş teklifi aldım nasıl bir cevap vermeliyim
- CDN Nedir?
- Centos 7 IP Değiştirme
- Centos Komutları
- Centos Kullanıcı Silme Komutu
- Centos NFS Disk Mount Etme
- Centos VMware Tools kurulumu
- CGNAT Nedir?
- ChatGPT Nedir? Nasıl Kullanılır? Arif Akyüz
- Christmas Lights
- Chrome Tarayıcı Geçmişi Silme
- Cisco Router Yapılandırma
- Cisco switch de açık ve kapalı portları görme
- Cisco Switch Kurulumu
- Cisco Switch Model Öğrenme Komutu
- Cisco Switch Port Açma ve Port Kapatma
- Cisco Switch Üzerinde ki Kullanıcıların Listesini çekme, Kullanıcı Oluşturma ve Kullanıcı Parolası Sıfırlama
- Cisco WLC AP Işıkları Yakma
- Cisco WLC IOS XE HTTP HTTPS Arayüzü Kapatma
- CMD ile Ağdaki Bilgisayarların Hostname Bilgisini Öğrenme
- CMD ile Bilgisayara Yüklü Uygulamaların Listesini Çekme
- CMD ile Bilgisayarı Kapatma
- CMD ile Bilgisayarı Yeniden Başlatma
- CMD ile dış IP öğrenme
- CMD ile Domaine Alma
- CMD ile Dosya Silme Komutu
- CMD ile Dosya ve Klasör arama
- CMD ile Dosya veya Klasör adı Değiştirme
- CMD ile Format Atma ve Diskpart ile Format Atma
- CMD ile Klasör Oluşturma
- CMD ile Klasör Silme
- CMD ile kullanıcı oluşturma
- CMD ile kullanıcı şifresi değiştirme
- CMD ile kullanıcı silme
- CMD ile Notebook’un Seri Numarasını Öğrenme
- CMD ile Time Zone Değiştirme Komutu
- CMD ile toplu ping atma
- CMD ile Uzak Bilgisayarı Kapatma
- CMD ile Web Sitesi Açma
- CMD komutları
- Çocuklar için Çarpım Tablosu
- Command to Learn Cisco Switch Serial Number With Putty and CLI
- Computer Management CMD Command
- Computer SID Öğrenme
- Copilot Nedir
- Cryptolocker Extension List
- CryptoLog – Cryptosim
- CSS icon Paket
- CSS ile div Gizleme İşlemi
- Deleting User Profile Files with Powershell
- DHCP Fail-over on Windows Server 2019
- Dijital Dönüşüm Nedir
- Dikkat çekici YouTube reklamları oluşturma rehberiniz
- Disable RDP Clipboard Group Policy
- Diskpart
- DNS Önbelleği Temizleme
- DNS Önbelleğini Görüntülemek ve Temizlemek
- Domain Admin Grubu Üyelerinin Listesi Çekme
- Domain Functional Level Upgrade
- Dosya İzinleri Sembolleri
- Doviz Çeviri
- Download VMware Tools
- DryTek Syslog Utility
- Duvar Kağıtları
- E-Ticaret Sitesi Nasıl Kurulur
- Edge Explorer Mode
- Edge Tarayıcı Geçmişi Silme
- En büyük 10 siber saldırı
- En çok kullanılan portlar
- En iyi Online Siber Güvenlik Araçları – Arif Akyüz
- Endpoint Central – FortiClient VPN Dağıtımı
- Endpoint Central – FortiClient VPN Un install
- EternalBlue nedir?
- Etkili Geri Bildirim
- Event ID – 6272 Network Policy Server Granted Access To A User
- Excel de Rastgele Sayı Üretme
- Excel de sütunları alt alta birleştirme
- Excel Filtrelenmiş Hücrelere Yapıştırma
- Excel klasör içindeki dosyaları listeleme
- Exchange CU bilgisi Öğrenme komutu
- Exchange versiyon bilgisi öğrenme komutu
- Exchange: Bypass Malware Filtering
- Facebook Pixel Kodu Nedir Nasıl Alınır
- Fake Hacker Screen
- Flash Diski Normal Diske Çevirme
- Formatlanan disk üzerinden veri kurtarma
- Forti Firewall – Forti Manager ile log izleme
- Forti Firewall Gelişmiş Filtreleme
- Forti Firewall IP verme
- Forti Firewall log kontrolü
- Forti Firewall tarih ve saat aralığına göre log izleme
- Forti Gate v7.4.1 KVM Kurulumu ve İncelemesi
- Forti IP verme
- FortiClient EMS Nedir
- FortiGate CLI ile Model Numarası Öğrenme
- FortiGate FortiOS 7.0 kurulumu
- Fortigate Yedek Alma
- FreeFileSync – Dosya eşitleme Programı
- Gelişim
- Gerçek Zamanlı Siber Tehdit Haritası
- Gizlilik politikası
- Google ADS dönüşüm izleme
- Google Bard ile Tanışın
- Google Chrome Allow cookies on These sites
- Google Chrome Allow JavaScipt on These sites
- Google Chrome Allow pop-ups on These sites
- Google Chrome Maskelenmiş Şifreleri Görüntüleme
- Google Chrome şifreleri içe aktarma
- Google DNS
- Google Gmail Uygulama şifresi oluşturma
- Google Reklam Verme
- Google Tag Manager Kurulumu Türkçe Anlatım
- Google Tag Manager Tıklama Takibi
- GPO – SMB signing not required
- GPO ile domain admin hesaplarının RDP yapmasını engelleme
- GPO ile Yalnızca Uzak masaüstü’nü Ağ Düzeyinde Kimlik Doğrulama ile çalıştıran bilgisayarlardan yapılan bağlantılara izin ver
- GRC Nedir?
- Group Policy ile OneDrive Ayarlarını Yönetme
- Güvenilir ve hızlı DNS Server Listesi
- Güvenli olmayan TLS Versiyonlarını kapatma
- Güvenlik Açığı Bilgi Bankası 07 Ağustos 2023 – 13 Ağustos 2023
- Hesap devamlı kilitleniyor
- hiberfil.sys nedir? hiberfil.sys Nasıl Silinir?
- Hız testi
- Hollanda’da saat kaç?
- Hong Kong’da saat kaç?
- How to configure Kaspersky VPN on pfSense using OpenVPN
- How to configure Proton VPN on pfSense using OpenVPN
- How to Create Trusted Self-Signed SSL Certificates and Local Domains for Testing
- HPE StoreOnce Systems
- HTML Dosyasına CSS Ekleme
- HTML Dosyasına JavaScript Bağlama
- HTML ile Basit Yapım Aşamasında Web Sitesi Kodu
- HTML Satır Aralığı
- Html Sayfalarında Satır Atlama ve Alt Satıra Geçme
- HTTP/1.1 ve HTTP/2: Fark Nedir?
- Hyper-V Sanal Makinesinin Kısayolu Nasıl Oluşturulur
- İç Network Saldırıları
- IE Prevent running First Run Wizard
- IIS Üzerinden CSR Kodu Nasıl Oluşturulur
- indir
- İngilizce Ölçü Birimlerini Okunuşu
- İngilizce Paranın Okunuşu
- İngilizce Sayılar ve Türkçe Okunuşları
- İngilizce Tanışma Soruları ve Cevapları
- İngilizce Yılların Okunuşu
- İngilizce Yüzdeli Sayıların Okunuşu
- INSTAGRAM REKLAM EĞİTİMİ
- Instagram Reklam Hesabı Kapatıldı
- Instagram Reklam Hesabım Kapatıldı Nasıl Açabilirim?
- Internet Explorer Devre Dışı Bırakma
- IP ile MAC adresi Öğrenme
- IPv6 Nedir?
- IPv6 Proxy
- IPv6 URL olarak nasıl yazılır
- İş teklifi alıyorum nasıl bir cevap vermeliyim
- ISP’lerin IP Blokları Firewall Kurallarınız İçin
- ISP’lerin Kullandığı IP Bloklarını Sorgulama
- İstanbul’da saat kaç?
- IT Denetim Maddeleri
- Kali Linux Crackmapexec Smb
- Kali Linux Hostname Değiştirme Komutu
- Kali Linux ile Güvenlik Açığı Tespit Etme
- Kali Linux Kurulumu
- Kali Linux NMAP Açık Port Sorgulama
- Kali Linux Özel Komutlar
- Kali Linux Program Kaldırma
- Kali Linux Python 3 Kurulumu ve HTTP Servisini Etkinleştirme
- Kali Linux Root Şifre Sıfırlama
- Kali Linux SNMPWALK
- Kali Linux SSH Portunu Aktif Etme
- Kali Linux Türkçe Yapma Kodu
- Kali Linux Update Komutu
- Kali Linux VMware tools kurulumu
- Kali Linux’a Apache Web Sunucusu Kurma
- Kali Linux’a NGINX Web Sunucusu Kurma
- Kali Root Şifresini Sıfırlama
- Kaspersky Security Center Sürüm Geçmişi
- Kendimi Nasıl Geliştirebilirim
- Komut İstemi kullanarak Windows Server Windows Update
- Kronometre
- Kullanıcı hesabının sürekli kilitlenmesi
- LAPS Komutları
- LAPS Kurulumu ve Yapılandırma
- Laptop bataryası dolduğunda ekranda bildirim çıkması
- Let’s Encrypt®FileZilla Server ile Nasıl Yapılandırılır
- Link-Local Multicast Name Resolution (LLMNR) enabled
- Linux için Log4j taraması
- Linux Ubuntu Apache de bir den fazla Web Sitesi Yayınlama
- Linux’ ta Process Yönetimi
- Linux’ta Dizin Yapısı
- Linux’ta Dosya İzinleri
- Linux’ta Kritik Dosyalar
- Linux’ta Paket Yönetimi
- Linux’ta Dosya komutları
- Linux’ta Kullanıcı yönetimi
- Lokasyon Yedekliliği
- Londra’da saat kaç?
- MAC Adresi Değiştirme
- Mağaza VLAN IP Genişletme
- Makaleler
- Mbps to kbps Converter
- Meditasyon Müzikleri
- Microsoft Edge Kaldırma
- Microsoft Edge Update Gif Video
- Microsoft Endpoint Manager
- Microsoft Entra Nedir?
- Microsoft Intune EDR import Server
- Microsoft Purview eDiscovery
- Microsoft Security Compliance Toolkit 1.0
- Microsoft Volume Licensing Service Center – 365
- Mozilla Firefox’u Active Directory GPO ile kaldırma
- msfconsole update
- MSFvenom ile Daha Güvenli Kod Elde Etme
- MSI ve EXE Dosyaları İçin Gözetimsiz Kurulum Parametreleri – Unattended Installation Parameters for MSI and EXE Files
- Multi Bootable USB Hazırlama
- NBTSTAT NEDİR
- NMAP Komutları
- Normal Kullanıcı ile Açılmış CMD üzerinden Yönetici olarak CMD Penceresine geçme
- Office 365 aktarım parametresi
- Office 365 Message Trace
- Office 365 Raporlama Paneli
- Office 365 Yönetim Paneli
- OneDrive Sürüm Geçmişi
- OneDrive Yüksek Ram Kullanımı
- Online Hesap Makinesi
- Online Kamera Test
- Online PDF Birleştirme
- Opencart Google Ads dönüşüm izleme kodu ekleme ( snippet ekleme )
- Opencart sosyal medya icon paketi
- Oracle Linux SSH Port Restart
- Oracle Linux SSH Services Status
- Oracle Linux Update Komutu
- Outlook ileri tarihli mail gönderme
- Outlook Mail Geri Çekme
- Password Expiration Date AD User
- Password Policy
- PDF Şifreleme ve PDF dosyasını şifreleme
- PfSense Güvenlik Duvarında IPSec VPN Nasıl Yapılandırılır
- Pfsense Güvenlik Duvarınızı Koruma: Let’s Encrypt ile Ücretsiz SSL Sertifikası Kurulumu
- pfSense HA Yapılandırması
- PfSENSE ile Network Trafiği İzleme
- pfSense OpenVPN Kurulumu
- PfSense URL Filter – URL Block
- PfSense’te GUI erişimi için 2FA nasıl yapılandırılır
- phpmyadmin Upload size değiştirme
- Ping IPv6
- PowerShell ile Active Directory de Kullanıcı Bilgileri Güncelleme
- PowerShell ile Active Directory de Kullanıcı Oluşturma
- PowerShell ile Active Directory de Toplu Kullanıcı Oluşturma
- PowerShell ile Active Directory Kurulumu Windows 10 ve Windows 11 için
- Powershell ile domain deki cihazların local admin hesaplarını çekme
- PowerShell ile Hostname ve İşletim sisitemi bilgilerini çekme
- PowerShell ile Konum Tespit Etme
- PowerShell ile Script Yazma
- Powershell ile Uzaktaki Bilgisayarlara Dosya Gönderme
- PowerShell Komutları
- PowerShell Komutu ile User Profile Dosyasını Silme
- PowerShell Nasıl Kullanılır
- Programsız CPU Sıcaklığını Görme
- PX to PT Converter
- Qualys Client Agent Manual Synchronization
- Qualys komutları – Arif Akyüz
- Qualys Kullanıcıların Açık Olduğu Cihazları Bulma
- Qualys Nedir? Nasıl Kurulur?
- Random MAC adresi Oluşturma
- Random password generator
- Ransomware Simulasyonu Nedir?
- Rastgele Şifre Oluşturucu
- RDP – Set time limit for disconnected sessions (30 minute)
- RDP Event Viewer ID
- RDP Network Level Authentication
- RDP Port Değiştirme
- Resmi Yazıya Dönüştürme Resmi Worde Dönüştürme
- rsync nedir nasıl çalışır komutları nelerdir?
- RVTools
- Sağ Tık Menüsüne Program Ekleme
- Sağlam Kurtarma Bölümü Silme
- Samsung tablet rom atma
- Samsung telefon rom atma
- SCP ile Linux Makinadan Dosya Alma
- Seçtiğiniz parolanın güvenli olduğuna emin olun!
- Server 2025 İndirme ve İnceleme
- Server odası Kontrol Listesi
- SharePoint site oluşturma
- Siber Farkındalık Mesajları
- Siber Güvenlik – Uzaktan Kamera Açma ve Konsol Elde Etme
- Siber Güvenlik – Websitesi Zafiyet Keşfi
- Siber Güvenlik Bülteni
- Siber Güvenlik Sertifikaları
- Siber Haberler
- SID ID Öğrenme
- Şifreli mail gönderme
- Sistem Güvenliği Nasıl Sağlanır?
- Sızma Testi nedir? Zafiyet taraması nedir?
- SM; FTP, SMB2, SMB3 (şifrelenmiş), AFP, NFS ve WebDAV
- SMB Signing Disabled
- SMB Signing Disabled or SMB Signing Not Required Solution
- SNMP V3 ve SNMPWALK V3 Kullanımı
- Snow Java Script Efect
- Snow-test
- Sosyal Mühendislik Atakları – Social Engineering
- Split Tunnel Nedir? Full Tunnel Nedir?
- SQL Injection Attack
- SQL Server 2019 kurulumu
- SSDP ne için kullanılır?
- Stelaer Saldırılarına Karşı Nasıl Güvende Olurum
- Sunucular için Sürdürülebilirlik
- Switch komutları
- Synology ds1515+ NAS Disk Kurulum
- Task Scheduler ile Dosya ve Klasör silme PowerShell ile Dosya ve Klasör silme
- Terminal Sunucularda tüm kullanıcılar için aynı proxy adresi tanımlama
- This device is joined to azure ad
- Time zones – Windows Time zones
- TÜM MAKALELER
- Ubuntu 22.04 LAMP Kurulumu
- Ubuntu 22.04 Mysql Kullanıcı Silme Mysql Database Silme Mysql Kullanıcı Listeleme Mysql Database Listeleme
- Ubuntu 22.04 Program Kaldırma
- Ubuntu 22.04 üzerine ownCloud Kurulumu
- Ubuntu 22.04’e Samba kurmak ve yapılandırmak
- Ubuntu Disk Genişletme (Disk Extend)
- Ubuntu dosya kopyalama komutu
- Ubuntu Kurulu Olan PHP Versiyonlarını Görme ve Değiştirme
- Ubuntu ManageEngine Endpoint Central Agent Installation.
- Ubuntu ManageEngine Endpoint Central Agent Removal.
- Ubuntu Masaüstüne Kısayol Oluşturma
- Ubuntu php8.1 Kaldırma Komutu
- Ubuntu Server Change IP Adress
- Ubuntu SSH Portunu açma
- Ubuntu Terminal Klavyeden Zoom Yapma Kısayolu
- Ubuntu Update ve Upgrade Komutu
- Ubuntu VMware Tools kurulumu
- Ubuntu’da Root Hesabı ile Oturum Açma
- Ubuntu’da Root Şifrenizi Değiştirme
- Uninstall Kaspersky Agent
- URL Filter Listesi
- USB Disk Engelleme Programsız
- USB İşletim Sistemi
- User SID Öğrenme
- Uzunluk ölçü birimleri
- vCenter Kullanıcı Yetkilendirme
- vCenter Kurulumu
- Viritual Box Sanal Makineler için Ağ Ayarları
- Virtual IPs nedir?
- Virtualized Intel VT-X/EPT is not supported on this platform Sorununun Çözümü
- Virüslerle Yeniden Tanışın Siber Farkındalık
- VM Backup Restore İşlemi
- Vmware Workstation Encryption Kırma
- VMware Workstation Network Ayarları ve Anlamları
- VMWare Workstation Sanal Makinaları Otomatik Olarak Başlatın
- WAN IP adresinizi PowerShell kullanarak Görüntülemek
- WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!
- We couldn’t update the system reserved partition – Server 2012 Upgrade to 2019
- What’s my IP
- Whatsapp sipariş butonu ekleme
- Whoami komutları
- Windows 10 Şifre Kırma Programsız
- Windows 10 Startup Folder
- Windows 10 sürüm geçmişi
- Windows 10 ve Windows 11 için PIN ile Oturum Açma
- Windows 11 – RSAT Active Directory, DHCP, DNS ve Bitlocker Yönetim Toolarının Kurulumu
- Windows 11 Görev Çubuğuna Masaüstü Klasörünü ekleme
- Windows 11 Startup Folder
- Windows 11 tema görünüm özelleştirme
- Windows 2016 Startup Folder
- Windows Boot Ekranındaki İsmi Değiştirme
- Windows da standart bir kullanıcının bir uygulamayı yönetici olarak çalıştırmasına izin verme
- Windows da uygulamanın hangi portu kullandığını bulma
- Windows için Log4j Taraması
- Windows SMB Version 1 (SMBv1) Detected
- Windows Terminal ile SSH Yapma
- Windows Üzerinde Port Yönlendirme
- Windows üzerine MacOS kurulumu VMware
- Windows’da İlgili Dosyaya Sadece Yazma Yetkisi Verme Taşıma ve Kopyalama Engelleme
- Windows’ta WireGuard Sunucusunu Kurun ve Yapılandırın
- Woocommerce Alışverişe kapatma
- WooCommerce Belirli Kategorilerde Fiyat Gizleme
- Woocommerce Bir kategoriyi Sepet Sayfasında Zorunlu Kılma
- WooCommerce Fiyat Gizleme
- WooCommerce Minimum ve Maximum Adet
- WooCommerce Seçenekli Ürünlerde En Düşük Fiyatı Gösterme
- Woocommerce sepete ekle düğmesinin üzerindeki ADET alanını gizleme
- WooCommerce SEPETE EKLE yazısı değiştirme
- Woocommerce ürün fiyatlarının yanına yazı yazma
- WooCommerce ürün sayfasında ürün açıklaması kaldırma
- Word Belgesine Şifre Koyma
- Word Belgesinin Korumasını Kaldırma
- Word İçindekiler tablosu oluşturma
- WordPress Arama butonu kaldırma gizleme
- WordPress Google Ads dönüşüm izleme kodu ekleme
- WordPress Whatsapp butonu ekleme
- Yapay Zeka Platformları
- Yönetim Konsollarım
- Zombi Video Wallpaper