Microsoft Ürünleri Güvenlik Açığı Bülteni
- Chromium: CVE-2024-8639 Use after free in Autofill
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2021) for more information.
- Chromium: CVE-2024-8638 Type Confusion in V8
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2021) for more information.
- Chromium: CVE-2024-8637 Use after free in Media Router
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2021) for more information.
- Chromium: CVE-2024-8636 Heap buffer overflow in Skia
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2021) for more information.
- ADV990001 Latest Servicing Stack Updates
Corrected security updates table. This is an informational update only.
- CVE-2024-43455 Windows Remote Desktop Licensing Service Spoofing Vulnerability
Information published.
- CVE-2024-21416 Windows TCP/IP Remote Code Execution Vulnerability
Information published.
- CVE-2024-38246 Win32k Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38239 Windows Kerberos Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38234 Windows Networking Denial of Service Vulnerability
Information published.
- CVE-2020-17042 Windows Print Spooler Remote Code Execution Vulnerability
In the Security Updates table, added Windows Server 2022 and Windows Server 2022 (Server Core installation) as these versions are affected by this vulnerability. Microsoft recommends that customers running any of these products install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.
- CVE-2024-43491 Microsoft Windows Update Remote Code Execution Vulnerability
Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July 2015). This means that an attacker could exploit these previously mitigated vulnerabilities on Windows 10, version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) systems that have installed the Windows security update released on March 12, 2024—KB5035858 (OS Build 10240.20526) or other updates released until August 2024. All later versions of Windows 10 are not impacted by this vulnerability. This servicing stack vulnerability is addressed by installing the September 2024 Servicing stack update (SSU KB5043936) AND the September 2024 Windows security update (KB5043083), in that order. Note: Windows 10, version 1507 reached the end of support (EOS) on May 9, 2017 for devices running the Pro, Home, Enterprise, Education, and Enterprise IoT editions. Only [Windows 10 Enterprise 2015 LTSB](https://learn.microsoft.com/en-us/lifecycle/products/windows-10-2015-ltsb) and [Windows 10 IoT Enterprise 2015 LTSB](https://learn.microsoft.com/en-us/lifecycle/products/windows-10-iot-enterprise-ltsb-2015) editions are still under support.
- CVE-2024-26186 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
Information published.
- CVE-2024-37342 Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
Information published.
- CVE-2024-37337 Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
Information published.
- CVE-2024-37339 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
Information published.
- CVE-2024-37340 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
Information published.
- CVE-2024-37335 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
Information published.
- CVE-2024-37966 Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
Information published.
- CVE-2024-43466 Microsoft SharePoint Server Denial of Service Vulnerability
Information published.
- CVE-2024-43476 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
Information published.
- CVE-2024-26191 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
Information published.
- CVE-2024-37980 Microsoft SQL Server Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38018 Microsoft SharePoint Server Remote Code Execution Vulnerability
Information published.
- CVE-2024-38232 Windows Networking Denial of Service Vulnerability
Information published.
- CVE-2024-38216 Azure Stack Hub Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38237 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38220 Azure Stack Hub Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38244 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38188 Azure Network Watcher VM Agent Elevation of Privilege Vulnerability
Information published.
- CVE-2024-37338 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
Information published.
- CVE-2024-38230 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
Information published.
- CVE-2024-38119 Windows Network Address Translation (NAT) Remote Code Execution Vulnerability
Information published.
- CVE-2024-38236 DHCP Server Service Denial of Service Vulnerability
Information published.
- CVE-2024-43458 Windows Networking Information Disclosure Vulnerability
Information published.
- CVE-2024-38240 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Information published.
- CVE-2024-43470 Azure Network Watcher VM Agent Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38241 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Information published.
- CVE-2024-30073 Windows Security Zone Mapping Security Feature Bypass Vulnerability
Information published.
- CVE-2024-38242 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Information published.
- ADV990001 Latest Servicing Stack Updates
Advisory updated to announce new versions of Servicing Stack Updates are available. Please see the FAQ for details.
- CVE-2024-38249 Windows Graphics Component Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38138 Windows Deployment Services Remote Code Execution Vulnerability
The following updates have been made to CVE-2024-38138: 1) In the Security Updates table, added all supported versions of the following as they are affected by this vulnerability: Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. 2) Further, to comprehensively address this vulnerability, Microsoft has released September 2024 security updates for all affected versions of Windows Server 2016, Windows Server 2019, Windows Server 2022, and Windows Server 2022, 23H2 Edition. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.
- CVE-2024-38250 Windows Graphics Component Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38231 Windows Remote Desktop Licensing Service Denial of Service Vulnerability
Information published.
- CVE-2024-38252 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38233 Windows Networking Denial of Service Vulnerability
Information published.
- CVE-2024-38253 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38235 Windows Hyper-V Denial of Service Vulnerability
Information published.
- CVE-2024-38254 Windows Authentication Information Disclosure Vulnerability
Information published.
- CVE-2024-38238 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38256 Windows Kernel-Mode Driver Information Disclosure Vulnerability
Information published.
- CVE-2024-38243 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38248 Windows Storage Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38245 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38258 Windows Remote Desktop Licensing Service Information Disclosure Vulnerability
Information published.
- CVE-2024-43463 Microsoft Office Visio Remote Code Execution Vulnerability
Information published.
- CVE-2024-38260 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
Information published.
- CVE-2024-38257 Microsoft AllJoyn API Information Disclosure Vulnerability
Information published.
- CVE-2024-43464 Microsoft SharePoint Server Remote Code Execution Vulnerability
Information published.
- CVE-2024-38259 Microsoft Management Console Remote Code Execution Vulnerability
Information published.
- CVE-2024-43467 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
Information published.
- CVE-2024-38263 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
Information published.
- CVE-2024-43474 Microsoft SQL Server Information Disclosure Vulnerability
Information published.
- CVE-2024-38045 Windows TCP/IP Remote Code Execution Vulnerability
Information published.
- CVE-2024-43482 Microsoft Outlook for iOS Information Disclosure Vulnerability
Information published.
- CVE-2024-43454 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
Information published.
- CVE-2024-43492 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
Information published.
- CVE-2024-43457 Windows Setup and Deployment Elevation of Privilege Vulnerability
Information published.
- CVE-2024-43465 Microsoft Excel Elevation of Privilege Vulnerability
Information published.
- CVE-2024-43461 Windows MSHTML Platform Spoofing Vulnerability
Information published.
- CVE-2024-37965 Microsoft SQL Server Elevation of Privilege Vulnerability
Information published.
- CVE-2024-43469 Azure CycleCloud Remote Code Execution Vulnerability
Information published.
- CVE-2024-37341 Microsoft SQL Server Elevation of Privilege Vulnerability
Information published.
- CVE-2024-43475 Microsoft Windows Admin Center Information Disclosure Vulnerability
Information published.
- CVE-2024-38014 Windows Installer Elevation of Privilege Vulnerability
Information published.
- CVE-2024-43479 Microsoft Power Automate Desktop Remote Code Execution Vulnerability
Information published.
- CVE-2024-38046 PowerShell Elevation of Privilege Vulnerability
Information published.
- CVE-2024-43487 Windows Mark of the Web Security Feature Bypass Vulnerability
Information published.
- CVE-2024-38217 Windows Mark of the Web Security Feature Bypass Vulnerability
Information published.
- CVE-2024-43495 Windows libarchive Remote Code Execution Vulnerability
Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action.
- CVE-2024-38225 Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38194 Azure Web Apps Elevation of Privilege Vulnerability
An authenticated attacker can exploit an improper authorization vulnerability in Azure Web Apps to elevate privileges over a network.
- CVE-2024-38226 Microsoft Publisher Security Feature Bypass Vulnerability
Information published.
- CVE-2024-38063 Windows TCP/IP Remote Code Execution Vulnerability
To comprehensively address CVE-2024-38063, Microsoft has released September 2024 security updates for all affected versions of Windows 10 Version 1809, Windows Server 2019, Windows Server 2022, and Windows 11 Version 21H2. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.
- CVE-2024-38227 Microsoft SharePoint Server Remote Code Execution Vulnerability
Information published.
- CVE-2024-35272 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
In the Security Updates table, added Visual Studio 2017 version 15.9, Visual Studio 2019 version 16.11, and Visual Studio 2022 versions 17.6, 17.8, 17.10, and 17.11 as they are also affected by this vulnerability. Microsoft recommends that customers running any of these products install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.
- CVE-2024-38228 Microsoft SharePoint Server Remote Code Execution Vulnerability
Information published.
- CVE-2024-38247 Windows Graphics Component Elevation of Privilege Vulnerability
Information published.
- CVE-2024-41879 Adobe: CVE-2024-41879 Adobe PDF Viewer Remote Code Execution Vulnerability
Information published.
- CVE-2024-38209 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
Information published.
- Chromium: CVE-2024-7978 Insufficient policy enforcement in Data Transfer
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-7969 Type Confusion in V8
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-7974 Insufficient data validation in V8 API
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-7979 Insufficient data validation in Installer
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-7980 Insufficient data validation in Installer
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- CVE-2024-38210 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
Information published.
- Chromium: CVE-2024-7968 Use after free in Autofill
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-7964 Use after free in Passwords
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-7965 Inappropriate implementation in V8
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-7971 Type confusion in V8
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information. Google is aware that an exploit for CVE-2024-7971 exists in the wild.
- Chromium: CVE-2024-7966 Out of bounds memory access in Skia
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- CVE-2024-43477 Entra ID Elevation of Privilege Vulnerability
Improper access control in Decentralized Identity Services allows an unathenticated attacker to disable Verifiable ID’s on another tenant.
- Chromium: CVE-2024-8034 Inappropriate implementation in Custom Tabs
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- CVE-2024-38208 Microsoft Edge for Android Spoofing Vulnerability
Information published.
- Chromium: CVE-2024-8033 Inappropriate implementation in WebApp Installs
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-7975 Inappropriate implementation in Permissions
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-7981 Inappropriate implementation in Views
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-7973 Heap buffer overflow in PDFium
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-8035 Inappropriate implementation in Extensions
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-7972 Inappropriate implementation in V8
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- CVE-2024-38178 Scripting Engine Memory Corruption Vulnerability
Updated acknowledgment. This is an informational change only.
- Chromium: CVE-2024-7977 Insufficient data validation in Installer
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-7967 Heap buffer overflow in Fonts
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- Chromium: CVE-2024-7976 Inappropriate implementation in FedCM
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.
- CVE-2024-38175 Azure Managed Instance for Apache Cassandra Elevation of Privilege Vulnerability
An improper access control vulnerability in the Azure Managed Instance for Apache Cassandra allows an authenticated attacker to elevate privileges over a network.
- CVE-2024-38189 Microsoft Project Remote Code Execution Vulnerability
Corrected Download links in the Security Updates table. This is an informational change only.
- CVE-2024-38173 Microsoft Outlook Remote Code Execution Vulnerability
Corrected Download links in the Security Updates table. This is an informational change only.
- CVE-2024-38211 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
Corrected Download links in the Security Updates table. This is an informational change only.
- CVE-2024-38171 Microsoft PowerPoint Remote Code Execution Vulnerability
Corrected Download links in the Security Updates table. This is an informational change only.
- CVE-2024-38165 Windows Compressed Folder Tampering Vulnerability
Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action.
- CVE-2024-38151 Windows Kernel Information Disclosure Vulnerability
Information published.
- CVE-2024-38155 Security Center Broker Information Disclosure Vulnerability
Information published.
- CVE-2024-38135 Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38146 Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
Information published.
- CVE-2024-38163 Windows Update Stack Elevation of Privilege Vulnerability
Information published.
- CVE-2024-37968 Windows DNS Spoofing Vulnerability
Information published.
- CVE-2024-38168 .NET and Visual Studio Denial of Service Vulnerability
Information published.
- CVE-2024-38172 Microsoft Excel Remote Code Execution Vulnerability
Information published.
- CVE-2024-38161 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action.
- CVE-2024-38167 .NET and Visual Studio Information Disclosure Vulnerability
Information published.
- CVE-2024-38160 Windows Network Virtualization Remote Code Execution Vulnerability
Information published.
- CVE-2024-38159 Windows Network Virtualization Remote Code Execution Vulnerability
Information published.
- CVE-2024-38123 Windows Bluetooth Driver Information Disclosure Vulnerability
Information published.
- CVE-2024-38173 Microsoft Outlook Remote Code Execution Vulnerability
Information published.
- CVE-2024-38178 Scripting Engine Memory Corruption Vulnerability
Information published.
- CVE-2024-38186 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action.
- CVE-2024-38184 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action.
- CVE-2024-38214 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Information published.
- CVE-2024-38191 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action.
- CVE-2024-29187 GitHub: CVE-2024-29187 WiX Burn-based bundles are vulnerable to binary hijack when run as SYSTEM
To comprehensively address CVE-2024-29187, Microsoft has released security updates on August 18, 2024 for Microsoft Visual Studio 2017 version 15.9, Microsoft Visual Studio 2019 version 16.11, and Microsoft Visual Studio 2022 version 17.6. Microsoft recommends customers install the updates to be fully protected from the vulnerability.
- CVE-2024-38193 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38108 Azure Stack Hub Spoofing Vulnerability
Information published.
- CVE-2024-38196 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38148 Windows Secure Channel Denial of Service Vulnerability
Information published.
- CVE-2024-38197 Microsoft Teams for iOS Spoofing Vulnerability
Information published.
- CVE-2024-38153 Windows Kernel Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38198 Windows Print Spooler Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38158 Azure IoT SDK Remote Code Execution Vulnerability
Information published.
- CVE-2024-38199 Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
Information published.
- CVE-2024-38170 Microsoft Excel Remote Code Execution Vulnerability
Information published.
- CVE-2024-38201 Azure Stack Hub Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38180 Windows SmartScreen Security Feature Bypass Vulnerability
Information published.
- CVE-2024-38213 Windows Mark of the Web Security Feature Bypass Vulnerability
Information published. This CVE was addressed by updates that were released in June 2024, but the CVE was inadvertently omitted from the June 2024 Security Updates. This is an informational change only. Customers who have already installed the June 2024 updates do not need to take any further action.
- CVE-2024-38189 Microsoft Project Remote Code Execution Vulnerability
Information published.
- ADV990001 Latest Servicing Stack Updates
Advisory updated to announce new versions of Servicing Stack Updates are available. Please see the FAQ for details.
- CVE-2024-38211 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
Information published.
- CVE-2024-38137 Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38223 Windows Initial Machine Configuration Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38140 Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability
Information published.
- CVE-2024-38081 .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
Corrected Article and Download entries in the Affected Products table. This is an informational change only.
- CVE-2024-38142 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38134 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38144 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
Information published.
- CVE-2024-21302 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Microsoft has released the August 2024 security updates that include an opt-in mitigation available as an interim solution to help protect customers concerned about this vulnerability until the final mitigation is available in a security update. For more information, please see [KB5042562: Guidance for blocking rollback of virtualization-based security related updates](https://support.microsoft.com/help/5042562).
- CVE-2022-2601 Redhat: CVE-2022-2601 grub2 – Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
Information published.
- CVE-2024-38138 Windows Deployment Services Remote Code Execution Vulnerability
Information published.
- CVE-2023-40547 Redhat: CVE-2023-40547 Shim – RCE in HTTP boot support may lead to secure boot bypass
Information published.
- CVE-2024-38141 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38084 Microsoft OfficePlus Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38143 Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38063 Windows TCP/IP Remote Code Execution Vulnerability
Information published.
- CVE-2024-38145 Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
Information published.
- CVE-2024-38098 Azure Connected Machine Agent Elevation of Privilege Vulnerability
Information published.
- CVE-2024-38147 Microsoft DWM Core Library Elevation of Privilege Vulnerability
Information published.
Arif Akyüz
Bilgi Teknolojileri
Sistem Network Yöneticisi
ve Siber Güvenlik Uzmanı
[email protected]
- .bak sql dosyası açma ve import etme işlemi
- .NET Framework 3.5 yüklemesi başarısız oluyor
- “Home Assistant ile SMTP Mail Kurulumu: Adım Adım Kılavuz ve En İyi Uygulamalar
- 1. SİBER GÜVENLİK – HEDEF BELİRLEME
- 2. SİBER GÜVENLİK – BİLGİ TOPLAMA
- 2024 Resmi Tatiller
- 2025 Resmi Tatiller
- 3. SİBER GÜVENLİK – TARAMA YAPMA
- 4. SİBER GÜVENLİK – YETKİ YÜKSELTME
- Açık Port Sorgulama CMD
- Active Directory – PDC Primary Active Directory Bulma Komutu
- Active Directory Computer Obje Silme Yetkisi
- Active Directory Güvenliği
- Active Directory Kullanıcı Oluşturma Yetkisi Verme
- Active Directory Silinmiş Nesneleri Kurtarma
- Active directory sunucularının saat ayarlarını dünya saatine göre senkronize etme
- Active Directory Unlock Account Permission
- Active Directory Zamana Dayalı Grup Üyeliği
- Active Directory’de LAPS Kullanarak Local Administrator Parolalarını Nasıl Yönetirsiniz?
- Active Directory’de LAPS Parolasını PowerShell İle Nasıl Görebilirsiniz?
- Active Directory’de LAPS Parolasını PowerShell ile Nasıl Sıfırlarsınız?
- Active Directory’den BitLocker Kurtarma Parolası nasıl alınır
- AD üzerinde Kullanıcının Parolasını kim sıfırlamış
- Adobe Illustrator ile Vektörel Logo Nasıl Yapılır
- Adobe Illustrator Yazıyı Vektöre Çevirme
- ADS ile Google Reklam Verme
- Ağırlık ölçü birimleri
- Alfabe
- Alfanümerik Nedir?
- AM ve PM Nedir?
- Amerika’da saat kaç?
- Anakart Modeli Nasıl Öğrenilir?
- Anydesk
- ARİF AKYÜZ – SİTE İÇERİĞİ
- Arif Akyüz Kimdir? Teknoloji Tutkunu Bir Profesyonelin Hikayesi
- ARP Nedir?
- ASN Kodu Nedir?
- Aynı Ağdaki Farklı Bir Cihazdaki Hyper-V Konsolunu Yönetme: Adım Adım Kılavuz
- Azure Active Directory
- Backup Policy
- Belirli Bir Süre Sonra Silinen Süreli Mail Gönderme
- Bilgisayar Model Bilgisi Değiştirme Windows
- Bilgisayara uygulanan Group policy görme komutu CMD
- Bilgisayara uygulanan Windows Updatelerin Listesini Çekme
- Bir Monitörün Karbon Ayak İzi
- Bitlocker Gpedit İle Devreye Alma İşlemi
- BitLocker ile USB Disk Şifreleme ve Yönetimi
- Biyometrik Fotoğraf Nedir?
- Bot nedir?
- Bu bilgisayar windows 11’i çalıştıramaz hatası çözümü
- C# XML Dosyası Veri Çekme, Ekleme, Silme, Güncelleme İşlemleri
- Çalışıyorum iş teklifi aldım nasıl bir cevap vermeliyim
- Canlı Destek
- CDN Nedir?
- Centos 7 IP Değiştirme
- Centos Komutları
- Centos Kullanıcı Silme Komutu
- Centos NFS Disk Mount Etme
- Centos VMware Tools kurulumu
- CGNAT Nedir?
- ChatGPT
- ChatGPT Nedir? Nasıl Kullanılır? Arif Akyüz
- Christmas Lights
- Chrome Tarayıcı Geçmişi Silme
- Cisco Meraki ağında bir cihaza MAC adresi kullanarak statik IP adresi nasıl atanır
- Cisco Router Yapılandırma
- Cisco switch de açık ve kapalı portları görme
- Cisco Switch Kurulumu
- Cisco Switch Model Öğrenme Komutu
- Cisco Switch Port Açma ve Port Kapatma
- Cisco Switch Üzerinde ki Kullanıcıların Listesini çekme, Kullanıcı Oluşturma ve Kullanıcı Parolası Sıfırlama
- Cisco WLC AP Işıkları Yakma
- Cisco WLC IOS XE HTTP HTTPS Arayüzü Kapatma
- CMD (Komut İstemi) Kullanarak Whois Sorgusu
- CMD ile Ağdaki Bilgisayarların Hostname Bilgisini Öğrenme
- CMD ile Bilgisayara Yüklü Uygulamaların Listesini Çekme
- CMD ile Bilgisayarı Kapatma
- CMD ile Bilgisayarı Yeniden Başlatma
- CMD ile dış IP öğrenme
- CMD ile Domaine Alma
- CMD ile Dosya Silme Komutu
- CMD ile Dosya ve Klasör arama
- CMD ile Dosya veya Klasör adı Değiştirme
- CMD ile Format Atma ve Diskpart ile Format Atma
- CMD ile Klasör Oluşturma
- CMD ile Klasör Silme
- CMD ile kullanıcı oluşturma
- CMD ile kullanıcı şifresi değiştirme
- CMD ile kullanıcı silme
- CMD ile Notebook’un Seri Numarasını Öğrenme
- CMD ile Time Zone Değiştirme Komutu
- CMD ile toplu ping atma
- CMD ile Uzak Bilgisayarı Kapatma
- CMD ile Web Sitesi Açma
- CMD komutları
- Çocuklar için Çarpım Tablosu
- Çok Uluslu Şirketlerin IT İhtiyaçları: Kapsamlı Bir Rehber
- Command to Learn Cisco Switch Serial Number With Putty and CLI
- Computer Management CMD Command
- Computer SID Öğrenme
- Copilot Nedir
- CrowdStrike Güncellemesi ile Gelen Mavi Ekran Sorununu Nasıl Çözebilirsiniz?
- Cryptolocker Extension List
- CryptoLog – Cryptosim
- CSS icon Paket
- CSS ile div Gizleme İşlemi
- Deleting User Profile Files with Powershell
- DHCP Fail-over on Windows Server 2019
- Dijital Dönüşüm Nedir
- Dikkat çekici YouTube reklamları oluşturma rehberiniz
- Disable RDP Clipboard Group Policy
- Diskpart
- DNS Önbelleği Temizleme
- DNS Önbelleğini Görüntülemek ve Temizlemek
- Domain Admin Grubu Üyelerinin Listesi Çekme
- Domain Admin Grubuna Yeni Kullanıcı Eklendiğinde Otomatik Bildirim Alın: PowerShell Betiği ile Adım Adım Kılavuz
- Domain Functional Level Upgrade
- Dosya İzinleri Sembolleri
- Doviz Çeviri
- Download VMware Tools
- DryTek Syslog Utility
- Dünyanın en Güvenilir ve hızlı DNS Sunucuları OpenDNS Google DNS Cloudflare DNS
- Duvar Kağıtları
- E-Ticaret Sitesi Nasıl Kurulur
- Edge Explorer Mode
- Edge Tarayıcı Geçmişi Silme
- Edge Tarayıcıda Arka Planı Siyah Yapma
- En büyük 10 siber saldırı
- En çok kullanılan portlar
- En çok Kullanılan TCP Portları ve Anlamları
- En çok Kullanılan UDP Portları ve Anlamları
- En iyi Online Siber Güvenlik Araçları – Arif Akyüz
- Endpoint Central – FortiClient VPN Dağıtımı
- Endpoint Central – FortiClient VPN Un install
- EternalBlue nedir?
- Etkili Geri Bildirim
- Event ID – 6272 Network Policy Server Granted Access To A User
- Excel de Rastgele Sayı Üretme
- Excel de sütunları alt alta birleştirme
- Excel Dosyasındaki İsimlerle PowerShell İle Toplu Klasör Oluşturma: Adım Adım Rehber
- Excel Filtrelenmiş Hücrelere Yapıştırma
- Excel klasör içindeki dosyaları listeleme
- Exchange CU bilgisi Öğrenme komutu
- Exchange versiyon bilgisi öğrenme komutu
- Exchange: Bypass Malware Filtering
- Facebook Pixel Kodu Nedir Nasıl Alınır
- Fake Hacker Screen
- Flash Diski Normal Diske Çevirme
- Formatlanan disk üzerinden veri kurtarma
- Forti Firewall – Forti Manager ile log izleme
- Forti Firewall Gelişmiş Filtreleme
- Forti Firewall IP verme
- Forti Firewall log kontrolü
- Forti Firewall tarih ve saat aralığına göre log izleme
- Forti Gate v7.4.1 KVM Kurulumu ve İncelemesi
- Forti IP verme
- FortiClient EMS Nedir
- FortiGate CLI ile Model Numarası Öğrenme
- FortiGate FortiOS 7.0 kurulumu
- Fortigate Yedek Alma
- FreeFileSync – Dosya eşitleme Programı
- Gelişim
- Gerçek Zamanlı Siber Tehdit Haritası
- Gizlilik politikası
- Google ADS dönüşüm izleme
- Google Bard ile Tanışın
- Google Chrome Allow cookies on These sites
- Google Chrome Allow JavaScipt on These sites
- Google Chrome Allow pop-ups on These sites
- Google Chrome Maskelenmiş Şifreleri Görüntüleme
- Google Chrome şifreleri içe aktarma
- Google DNS
- Google Gmail Uygulama şifresi oluşturma
- Google Reklam Verme
- Google Tag Manager Kurulumu Türkçe Anlatım
- Google Tag Manager Tıklama Takibi
- GPO – SMB signing not required
- GPO ile domain admin hesaplarının RDP yapmasını engelleme
- GPO ile Yalnızca Uzak masaüstü’nü Ağ Düzeyinde Kimlik Doğrulama ile çalıştıran bilgisayarlardan yapılan bağlantılara izin ver
- GRC Nedir?
- Group Policy ile OneDrive Ayarlarını Yönetme
- Günlük Otomatik FTP Yedekleme ve Eski Yedeklerin Silinmesi
- Güvenli olmayan TLS Versiyonlarını kapatma
- Güvenlik Açığı Bilgi Bankası 07 Ağustos 2023 – 13 Ağustos 2023
- Hesap devamlı kilitleniyor
- hiberfil.sys nedir? hiberfil.sys Nasıl Silinir?
- Hız testi
- Hollanda’da saat kaç?
- Hong Kong’da saat kaç?
- How to configure Kaspersky VPN on pfSense using OpenVPN
- How to configure Proton VPN on pfSense using OpenVPN
- How to Create Trusted Self-Signed SSL Certificates and Local Domains for Testing
- HPE StoreOnce Systems
- HTML Dosyasına CSS Ekleme
- HTML Dosyasına JavaScript Bağlama
- HTML ile Basit Yapım Aşamasında Web Sitesi Kodu
- HTML Satır Aralığı
- Html Sayfalarında Satır Atlama ve Alt Satıra Geçme
- HTTP/1.1 ve HTTP/2: Fark Nedir?
- Hyper-V Config Tools
- Hyper-V Sanal Makinesinin Kısayolu Nasıl Oluşturulur
- İç Network Saldırıları
- IDS Nedir
- IE Prevent running First Run Wizard
- IIS Üzerinden CSR Kodu Nasıl Oluşturulur
- indir
- İngilizce Ölçü Birimlerini Okunuşu
- İngilizce Paranın Okunuşu
- İngilizce Sayılar ve Türkçe Okunuşları
- İngilizce Tanışma Soruları ve Cevapları
- İngilizce Yılların Okunuşu
- İngilizce Yüzdeli Sayıların Okunuşu
- INSTAGRAM REKLAM EĞİTİMİ
- Instagram Reklam Hesabı Kapatıldı
- Instagram Reklam Hesabım Kapatıldı Nasıl Açabilirim?
- Internet Explorer Devre Dışı Bırakma
- IP ile MAC adresi Öğrenme
- IPS Nedir
- IPv6 Nedir?
- IPv6 Proxy
- IPv6 URL olarak nasıl yazılır
- İş teklifi alıyorum nasıl bir cevap vermeliyim
- ISP’lerin IP Blokları Firewall Kurallarınız İçin
- ISP’lerin Kullandığı IP Bloklarını Sorgulama
- İstanbul’da saat kaç?
- IT Denetim Maddeleri
- Kali Linux Crackmapexec Smb
- Kali Linux Hostname Değiştirme Komutu
- Kali Linux ile Güvenlik Açığı Tespit Etme
- Kali Linux ile Güvenlik Açığı Tespit Etme Rehberi: Adım Adım Kılavuz
- Kali Linux Kurulumu
- Kali Linux NMAP Açık Port Sorgulama
- Kali Linux Özel Komutlar
- Kali Linux Program Kaldırma
- Kali Linux Python 3 Kurulumu ve HTTP Servisini Etkinleştirme
- Kali Linux Root Şifre Sıfırlama
- Kali Linux SNMPWALK
- Kali Linux SSH Portunu Aktif Etme
- Kali Linux Türkçe Yapma Kodu
- Kali Linux Update Komutu
- Kali Linux VMware tools kurulumu
- Kali Linux’a Apache Web Sunucusu Kurma
- Kali Linux’a NGINX Web Sunucusu Kurma
- Kali Root Şifresini Sıfırlama
- Kaspersky Security Center Sürüm Geçmişi
- Kendimi Nasıl Geliştirebilirim
- Komut İstemi kullanarak Windows Server Windows Update
- Kronometre
- Kullanıcı hesabının sürekli kilitlenmesi
- Kurumsal Toplantı Sonrası Kullanılabilecek İfade: “Let’s Meet Again!”
- LAPS Komutları
- LAPS Kurulumu ve Yapılandırma
- Laptop bataryası dolduğunda ekranda bildirim çıkması
- Let’s Encrypt®FileZilla Server ile Nasıl Yapılandırılır
- Link-Local Multicast Name Resolution (LLMNR) enabled
- Linux için Log4j taraması
- Linux Ubuntu Apache de bir den fazla Web Sitesi Yayınlama
- Linux’ ta Process Yönetimi
- Linux’ta Dizin Yapısı
- Linux’ta Dosya İzinleri
- Linux’ta Kritik Dosyalar
- Linux’ta Paket Yönetimi
- Linux’ta Dosya komutları
- Linux’ta Kullanıcı yönetimi
- Live Chat
- Lokasyon Yedekliliği
- Londra’da saat kaç?
- MAC Adresi Değiştirme
- Mağaza VLAN IP Genişletme
- Makaleler
- Mbps to kbps Converter
- Meditasyon Müzikleri
- Microsoft Edge Kaldırma
- Microsoft Edge Update Gif Video
- Microsoft Endpoint Manager
- Microsoft Entra Nedir?
- Microsoft Intune EDR import Server
- Microsoft Purview eDiscovery
- Microsoft Security Compliance Toolkit 1.0
- Microsoft Volume Licensing Service Center – 365
- Mozilla Firefox’u Active Directory GPO ile kaldırma
- msfconsole update
- MSFvenom ile Daha Güvenli Kod Elde Etme
- MSI ve EXE Dosyaları İçin Gözetimsiz Kurulum Parametreleri – Unattended Installation Parameters for MSI and EXE Files
- Multi Bootable USB Hazırlama
- Müşteri Kaydı
- Müşteri Sorgulama
- NBTSTAT NEDİR
- Nmap ile Güvenlik Açığı Taraması: Adım Adım Rehber
- NMAP Komutları
- Normal Kullanıcı ile Açılmış CMD üzerinden Yönetici olarak CMD Penceresine geçme
- Office 365 aktarım parametresi
- Office 365 Message Trace
- Office 365 Raporlama Paneli
- Office 365 Yönetim Paneli
- OneDrive Sürüm Geçmişi
- OneDrive Yüksek Ram Kullanımı
- Online Hesap Makinesi
- Online Kamera Test
- Online Meeting
- Online PDF Birleştirme
- Online Ping
- OpenAI Chatbot
- Opencart Google Ads dönüşüm izleme kodu ekleme ( snippet ekleme )
- OpenCart Sosyal Medya İkon Paketi | Kolay Entegrasyon ve Özelleştirme
- Oracle Linux SSH Port Restart
- Oracle Linux SSH Services Status
- Oracle Linux Update Komutu
- Oracle Linux, CentOS ve Ubuntu Server’da Dış IP Adresi Öğrenme Yöntemleri
- Outlook ileri tarihli mail gönderme
- Outlook Mail Geri Çekme
- Outlook okundu olmuyor
- OwnCloud Bellek Temizliği
- Pass-the-Hash (PtH) Saldırısı Nedir ve Nasıl Korunulur? | Siber Güvenlik Rehberi
- Password Expiration Date AD User
- Password Policy
- PDF Şifreleme ve PDF dosyasını şifreleme
- PfSense Güvenlik Duvarında IPSec VPN Nasıl Yapılandırılır
- Pfsense Güvenlik Duvarınızı Koruma: Let’s Encrypt ile Ücretsiz SSL Sertifikası Kurulumu
- pfSense HA Yapılandırması
- PfSENSE ile Network Trafiği İzleme
- pfSense OpenVPN Kurulumu
- PfSense URL Filter – URL Block
- PfSense’te GUI erişimi için 2FA nasıl yapılandırılır
- phpmyadmin Upload size değiştirme
- Ping IPv6
- Power Shell ile Ağdaki Cihazlarda Local Admin Hesabı Oluşturma
- PowerShell ile Active Directory de Kullanıcı Bilgileri Güncelleme
- PowerShell ile Active Directory de Kullanıcı Oluşturma
- PowerShell ile Active Directory de Toplu Kullanıcı Oluşturma
- PowerShell ile Active Directory Kurulumu Windows 10 ve Windows 11 için
- Powershell ile ADB Komutları: Android Cihazlarını Yönetme Rehberi
- PowerShell ile Domain Admin Grubuna Üye Kullanıcıları Listeleme
- Powershell ile domain deki cihazların local admin hesaplarını çekme
- PowerShell İle E-posta Gönderme SMTP Protokolü Kullanarak
- Powershell ile EXE Dosyası Oluşturma: Adım Adım Rehber
- PowerShell ile Hostname ve İşletim sisitemi bilgilerini çekme
- PowerShell ile İki Gün Önce Oluşturulmuş Dosyaları Otomatik Silme
- PowerShell ile Konum Tespit Etme
- PowerShell ile Regedit Kaydı Oluşturma
- PowerShell ile Script Yazma
- Powershell ile Uzaktaki Bilgisayarlara Dosya Gönderme
- PowerShell ile Windows Uygulamalarını Zorla Kaldırma Rehberi
- PowerShell Komutları
- PowerShell Komutları: Dosya, Sistem ve Ağ Yönetimi İçin Kapsamlı Rehber
- PowerShell Komutu ile User Profile Dosyasını Silme
- PowerShell Nasıl Kullanılır
- Programsız CPU Sıcaklığını Görme
- PS2EXE Modülünü PowerShell ile İndirme
- PX to PT Converter
- Python ile 443 Portu Dinleme ve Bağlantı Sağlama: Basit Test Betikleri
- Python ile 80 Portu Dinleme ve Bağlantı Sağlama: Basit Test Betikleri
- Python ile Otomatik E-Posta Gönderme ve SEO Meta Verileri Oluşturma
- Python ile Otomatik Oturum Açarak CPanel ve PhpMyAdmin Üzerinden Veritabanı Yedekleme Adımları
- Python ile Sunucu-İstemci Modeli Nasıl Oluşturulur?
- Qualys Client Agent Manual Synchronization
- Qualys komutları – Arif Akyüz
- Qualys Kullanıcıların Açık Olduğu Cihazları Bulma
- Qualys Nedir? Nasıl Kurulur?
- Random MAC adresi Oluşturma
- Random password generator
- Ransomware Simulasyonu Nedir?
- Rastgele Şifre Oluşturucu
- RDP – Set time limit for disconnected sessions (30 minute)
- RDP Event Viewer ID
- RDP Network Level Authentication
- RDP Port Değiştirme
- Resmi Yazıya Dönüştürme Resmi Worde Dönüştürme
- rsync nedir nasıl çalışır komutları nelerdir?
- RVTools
- Sağ Tık Menüsüne Program Ekleme
- Sağlam Kurtarma Bölümü Silme
- Samsung tablet rom atma
- Samsung telefon rom atma
- SCP ile Linux Makinadan Dosya Alma
- SD-WAN Nedir
- Seçtiğiniz parolanın güvenli olduğuna emin olun!
- Server 2025 İndirme ve İnceleme
- Server odası Kontrol Listesi
- SharePoint site oluşturma
- Siber Farkındalık Mesajları
- Siber Güvenlik – Uzaktan Kamera Açma ve Konsol Elde Etme
- Siber Güvenlik – Websitesi Zafiyet Keşfi
- Siber Güvenlik Bülteni
- Siber Güvenlik Sertifikaları
- Siber Haberler
- SID ID Öğrenme
- Şifreli mail gönderme
- Sistem Güvenliği Nasıl Sağlanır?
- Sızma Testi nedir? Zafiyet taraması nedir?
- SM; FTP, SMB2, SMB3 (şifrelenmiş), AFP, NFS ve WebDAV
- SMB Signing Disabled
- SMB Signing Disabled or SMB Signing Not Required Solution
- SMB Signing Disabled or SMB Signing Not Required zafiyetini kapatma
- SNMP V3 ve SNMPWALK V3 Kullanımı
- Snow Java Script Efect
- Snow-test
- Sosyal Mühendislik Atakları – Social Engineering
- Split Tunnel Nedir? Full Tunnel Nedir?
- SQL Injection Attack
- SQL Server 2019 kurulumu
- SSDP ne için kullanılır?
- Standart bir kullanıcı hesabıyla domain admin grubuna üye olan kullanıcıların listesini çekmek
- Stelaer Saldırılarına Karşı Nasıl Güvende Olurum
- Sunucular için Sürdürülebilirlik
- Switch komutları
- Synology ds1515+ NAS Disk Kurulum
- Task Scheduler ile Dosya ve Klasör silme PowerShell ile Dosya ve Klasör silme
- Terminal Sunucularda tüm kullanıcılar için aynı proxy adresi tanımlama
- This device is joined to azure ad
- Time zones – Windows Time zones
- TÜM MAKALELER
- Tüm Yazıları
- Ubuntu 22.04 LAMP Kurulumu
- Ubuntu 22.04 Mysql Kullanıcı Silme Mysql Database Silme Mysql Kullanıcı Listeleme Mysql Database Listeleme
- Ubuntu 22.04 Program Kaldırma
- Ubuntu 22.04 üzerine ownCloud Kurulumu
- Ubuntu 22.04’e Samba kurmak ve yapılandırmak
- Ubuntu Disk Genişletme (Disk Extend)
- Ubuntu dosya kopyalama komutu
- Ubuntu Kurulu Olan PHP Versiyonlarını Görme ve Değiştirme
- Ubuntu ManageEngine Endpoint Central Agent Installation.
- Ubuntu ManageEngine Endpoint Central Agent Removal.
- Ubuntu Masaüstüne Kısayol Oluşturma
- Ubuntu php8.1 Kaldırma Komutu
- Ubuntu Server Change IP Adress
- Ubuntu SSH Portunu açma
- Ubuntu Terminal Klavyeden Zoom Yapma Kısayolu
- Ubuntu Update ve Upgrade Komutu
- Ubuntu VMware Tools kurulumu
- Ubuntu’da hostname değiştirmek için aşağıdaki adımları izleyebilirsiniz:
- Ubuntu’da Root Hesabı ile Oturum Açma
- Ubuntu’da Root Şifrenizi Değiştirme
- Ücretsiz ve Sınırlı Zafiyet Tarayıcıları: OpenVAS, Nessus ve Nikto ile Güvenliğinizi Artırın
- Uninstall Kaspersky Agent
- Upload
- URL Filter Listesi
- Ürün Çekme
- USB Disk Engelleme Programsız
- USB İşletim Sistemi
- User SID Öğrenme
- Uzunluk ölçü birimleri
- vCenter Kullanıcı Yetkilendirme
- vCenter Kurulumu
- Viritual Box Sanal Makineler için Ağ Ayarları
- Virtual IPs nedir?
- Virtualized Intel VT-X/EPT is not supported on this platform Sorununun Çözümü
- Virüslerle Yeniden Tanışın Siber Farkındalık
- VM Backup Restore İşlemi
- Vmware Workstation Encryption Kırma
- VMware Workstation Network Ayarları ve Anlamları
- VMWare Workstation Sanal Makinaları Otomatik Olarak Başlatın
- WAN IP adresinizi PowerShell kullanarak Görüntülemek
- WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!
- We couldn’t update the system reserved partition – Server 2012 Upgrade to 2019
- Web Sitenize WhatsApp ve Instagram Butonları Nasıl Eklenir? (Adım Adım Rehber)
- What is My IP? – IP Adresinizi Hızla Öğrenin
- Whatsapp Butonu
- Whatsapp sipariş butonu ekleme
- Whoami komutları
- Windows 10 Şifre Kırma Programsız
- Windows 10 Startup Folder
- Windows 10 sürüm geçmişi
- Windows 10 ve Windows 11 için PIN ile Oturum Açma
- Windows 11 – RSAT Active Directory, DHCP, DNS ve Bitlocker Yönetim Toolarının Kurulumu
- Windows 11 Görev Çubuğuna Masaüstü Klasörünü ekleme
- Windows 11 Startup Folder
- Windows 11 tema görünüm özelleştirme
- Windows 2016 Startup Folder
- Windows Boot Ekranındaki İsmi Değiştirme
- Windows da standart bir kullanıcının bir uygulamayı yönetici olarak çalıştırmasına izin verme
- Windows da uygulamanın hangi portu kullandığını bulma
- Windows Defender Credential Guard Kaydedilmiş Kimlik Bilgilerini Kullanmaya İzin Vermiyor
- Windows için Log4j Taraması
- Windows SMB Version 1 (SMBv1) Detected
- Windows Terminal ile SSH Yapma
- Windows Update’in yüklendiği saati görmenin yolu var mı?
- Windows Üzerinde Port Yönlendirme
- Windows üzerine MacOS kurulumu VMware
- Windows’da İlgili Dosyaya Sadece Yazma Yetkisi Verme Taşıma ve Kopyalama Engelleme
- Windows’da Standart Kullanıcıya WMI Verilerini Okuma Yetkisi Verme
- Windows’ta WireGuard Sunucusunu Kurun ve Yapılandırın
- WinRM’in etkin olup olmadığını öğrenmek için birkaç farklı yöntem kullanabilirsiniz
- Woocommerce Alışverişe kapatma
- WooCommerce Belirli Kategorilerde Fiyat Gizleme
- Woocommerce Bir kategoriyi Sepet Sayfasında Zorunlu Kılma
- WooCommerce Fiyat Gizleme
- WooCommerce Minimum ve Maximum Adet
- WooCommerce Seçenekli Ürünlerde En Düşük Fiyatı Gösterme
- Woocommerce sepete ekle düğmesinin üzerindeki ADET alanını gizleme
- WooCommerce SEPETE EKLE yazısı değiştirme
- Woocommerce ürün fiyatlarının yanına yazı yazma
- WooCommerce ürün sayfasında ürün açıklaması kaldırma
- Word Belgesine Şifre Koyma
- Word Belgesinin Korumasını Kaldırma
- Word İçindekiler tablosu oluşturma
- WordPress Arama butonu kaldırma gizleme
- WordPress Debug Loglarını Nasıl Devre Dışı Bırakabilirsiniz? | Güvenlik İçin İpuçları
- WordPress Google Ads dönüşüm izleme kodu ekleme
- WordPress Sitenize Mobil Cihazlardan Görülebilecek Bir Navigator Footer Ekleme Rehberi
- WordPress Sitenizi Güvende Tutmanın 10 Etkili Yolu: Adım Adım Kılavuz
- WordPress Whatsapp butonu ekleme
- WordPress’te Özel Mouse Simgesi Ayarlama: Adım Adım Kılavuz
- WPScan API Kullanarak Kapsamlı WordPress Güvenlik Taraması
- WPScan ile WordPress Güvenlik Taraması: Adım Adım Rehber
- Yapay Zeka AI Yüzü
- Yapay Zeka Platformları ve Makine Öğrenimi
- Yönetim Konsollarım
- Youtube Video Test
- Yüz Tanıma Sistemi Kurulumu
- Zombi Video Wallpaper