{"id":27898,"date":"2024-07-09T18:39:59","date_gmt":"2024-07-10T01:39:59","guid":{"rendered":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/"},"modified":"2024-07-09T18:39:59","modified_gmt":"2024-07-10T01:39:59","slug":"microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days","status":"publish","type":"post","link":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/","title":{"rendered":"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days"},"content":{"rendered":"<p>As of late is Microsoft&#8217;s July 2024 Patch Tuesday, which includes security updates for 142 flaws, including two actively exploited and two publicly disclosed zero-days.<\/p>\n<p>This Patch Tuesday mounted five principal vulnerabilities, with all being a ways flung code execution flaws.<\/p>\n<p>This month&#8217;s Patch Tuesday fixes two actively exploited and two other publicly disclosed zero-day vulnerabilities.<\/p>\n<p>Microsoft classifies a zero-day flaw as one which is publicly disclosed or actively exploited while no official repair is supplied.<\/p>\n<p>Microsoft has mounted an actively exploited Hyper-V elevation of privileges vulnerability that affords attackers SYSTEM privileges.<\/p>\n<p>&#8220;An attacker who efficiently exploited this vulnerability would possibly well salvage SYSTEM privileges,&#8221; explains Microsoft.<\/p>\n<p>While Microsoft states that the flaw is actively exploited, it has no longer shared any longer principal parts about the vulnerability, including who chanced on it.<\/p>\n<p>&#8220;Worthwhile exploitation of this vulnerability requires an attacker to rob extra actions before exploitation to put collectively the aim ambiance,&#8221; explains Microsoft.<\/p>\n<p>&#8220;An attacker would get dangle of to send the victim a malicious file that the victim would get dangle of to assemble,&#8221; endured Microsoft.<\/p>\n<p>Microsoft didn&#8217;t part any longer principal parts on how the vulnerability became once exploited.<\/p>\n<p>Microsoft mounted a publicly disclosed .NET and Visual Studio RCE.<\/p>\n<p>&#8220;An attacker would possibly well exploit this by closing an http\/3 stream while the request physique is being processed ensuing in a lunge condition. This would possibly well outcome in a ways flung code execution,&#8221; explains Microsoft.<\/p>\n<p>Microsoft has no longer shared the set aside it became once publicly disclosed and mentioned it became once internally chanced on by&nbsp;Radek Zikmund of Microsoft Corporation.<\/p>\n<p><strong><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37985\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-37985<\/a> &#8211; Arm: CVE-2024-37985 Systematic Identification and Characterization of Proprietary Prefetchers<\/strong><\/p>\n<p>Microsoft has mounted a beforehand disclosed &#8220;<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623124\" target=\"_blank\" rel=\"nofollow noopener\">FetchBench<\/a>&#8221; side-channel assault that can even be frail to understand &#8220;secret data.&#8221;<\/p>\n<p>&#8220;An attacker who efficiently exploited this vulnerability would possibly well stare heap memory from a privileged direction of working on the server,&#8221; explains Microsoft.<\/p>\n<p>&#8220;Worthwhile exploitation of this vulnerability requires an attacker to rob extra actions before exploitation to put collectively the aim ambiance,&#8221; endured Microsoft.<\/p>\n<p>Below is the complete checklist of resolved vulnerabilities within the July 2024 Patch Tuesday updates.<\/p>\n<p>To&nbsp;access the paunchy description of every vulnerability and the programs&nbsp;it impacts, that you just would possibly well presumably also stare the<a href=\"https:\/\/www.bleepingcomputer.com\/microsoft-patch-tuesday-reports\/Microsoft-Patch-Tuesday-July-2024.html\" target=\"_blank\" rel=\"noopener\">paunchy document right here<\/a>.<\/p>\n<div>\n<table readabilitydatatable=\"1\">\n<tbody>\n<tr>\n<th>Label<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<th>Severity<\/th>\n<\/tr>\n<tr>\n<td>.NET and Visual Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30105\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30105<\/a><\/td>\n<td>.NET Core and Visual Studio Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>.NET and Visual Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38081\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38081<\/a><\/td>\n<td>.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>.NET and Visual Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35264\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35264<\/a><\/td>\n<td>.NET and Visual Studio Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>.NET and Visual Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38095\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38095<\/a><\/td>\n<td>.NET and Visual Studio Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Active Directory Rights Management Products and services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-39684\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-39684<\/a><\/td>\n<td>Github: CVE-2024-39684 TenCent RapidJSON Elevation of Privilege Vulnerability<\/td>\n<td>Average<\/td>\n<\/tr>\n<tr>\n<td>Active Directory Rights Management Products and services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38517\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38517<\/a><\/td>\n<td>Github: CVE-2024-38517 TenCent RapidJSON Elevation of Privilege Vulnerability<\/td>\n<td>Average<\/td>\n<\/tr>\n<tr>\n<td>Azure CycleCloud<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38092\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38092<\/a><\/td>\n<td>Azure CycleCloud Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure DevOps<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35266\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35266<\/a><\/td>\n<td>Azure DevOps Server Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure DevOps<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35267\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35267<\/a><\/td>\n<td>Azure DevOps Server Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure Kinect SDK<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38086\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38086<\/a><\/td>\n<td>Azure Kinect SDK Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure Network Watcher<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35261\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35261<\/a><\/td>\n<td>Azure Network Watcher VM Extension Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Intel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37985\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37985<\/a><\/td>\n<td>Arm: CVE-2024-37985 Systematic Identification and Characterization of Proprietary Prefetchers<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Line Printer Daemon Carrier (LPD)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38027\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38027<\/a><\/td>\n<td>Dwelling windows Line Printer Daemon Carrier Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Defender for IoT<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38089\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38089<\/a><\/td>\n<td>Microsoft Defender for IoT Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Dynamics<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30061\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30061<\/a><\/td>\n<td>Microsoft Dynamics 365 (On-Premises) Details Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Factor<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38079\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38079<\/a><\/td>\n<td>Dwelling windows Graphics Factor Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Factor<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38051\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38051<\/a><\/td>\n<td>Dwelling windows Graphics Factor Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Place of job<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38021\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38021<\/a><\/td>\n<td>Microsoft Place of job Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Place of job Outlook<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38020\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38020<\/a><\/td>\n<td>Microsoft Outlook Spoofing Vulnerability<\/td>\n<td>Average<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Place of job SharePoint<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38024\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38024<\/a><\/td>\n<td>Microsoft SharePoint Server Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Place of job SharePoint<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38023\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38023<\/a><\/td>\n<td>Microsoft SharePoint Server Far flung Code Execution Vulnerability<\/td>\n<td><span>Important<\/span><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Place of job SharePoint<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-32987\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-32987<\/a><\/td>\n<td>Microsoft SharePoint Server Details Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Place of job SharePoint<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38094\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38094<\/a><\/td>\n<td>Microsoft SharePoint Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Streaming Carrier<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38057\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38057<\/a><\/td>\n<td>Kernel Streaming WOW Thunk Carrier Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Streaming Carrier<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38054\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38054<\/a><\/td>\n<td>Kernel Streaming WOW Thunk Carrier Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Streaming Carrier<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38052\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38052<\/a><\/td>\n<td>Kernel Streaming WOW Thunk Carrier Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Dwelling windows Codecs Library<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38055\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38055<\/a><\/td>\n<td>Microsoft Dwelling windows Codecs Library Details Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Dwelling windows Codecs Library<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38056\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38056<\/a><\/td>\n<td>Microsoft Dwelling windows Codecs Library Details Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft WS-Discovery<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38091\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38091<\/a><\/td>\n<td>Microsoft WS-Discovery Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>NDIS<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38048\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38048<\/a><\/td>\n<td>Dwelling windows Network Driver Interface Specification (NDIS) Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>NPS RADIUS Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-3596\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-3596<\/a><\/td>\n<td>CERT\/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Role: Active Directory Certificate Products and services; Active Directory Area Products and services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38061\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38061<\/a><\/td>\n<td>DCOM Far flung Faulty-Session Activation Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Role: Dwelling windows Hyper-V<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38080\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38080<\/a><\/td>\n<td>Dwelling windows Hyper-V Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-28928\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-28928<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38088\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38088<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-20701\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-20701<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21317\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21317<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21331\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21331<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21308\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21308<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21333\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21333<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35256\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35256<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21303\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21303<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21335\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21335<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35271\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35271<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35272\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35272<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21332\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21332<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38087\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38087<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21425\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21425<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21449\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21449<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37324\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37324<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37330\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37330<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37326\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37326<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37329\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37329<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37328\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37328<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37327\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37327<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37334\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37334<\/a><\/td>\n<td>Microsoft OLE DB Driver for SQL Server Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37321\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37321<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37320\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37320<\/a><\/td>\n<td>SQL Server Native Consumer OLE D B Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37319\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37319<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37322\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37322<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37333\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37333<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37336\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37336<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37323\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37323<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37331\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37331<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21398\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21398<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21373\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21373<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37318\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37318<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21428\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21428<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21415\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21415<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37332\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37332<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21414\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21414<\/a><\/td>\n<td>SQL Server Native Consumer OLE DB Provider Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows BitLocker<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38058\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38058<\/a><\/td>\n<td>BitLocker Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows COM Session<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38100\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38100<\/a><\/td>\n<td>Dwelling windows File Explorer Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows CoreMessaging<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21417\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21417<\/a><\/td>\n<td>Dwelling windows Text Products and services Framework Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Cryptographic Products and services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30098\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30098<\/a><\/td>\n<td>Dwelling windows Cryptographic Products and services Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows DHCP Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38044\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38044<\/a><\/td>\n<td>DHCP Server Carrier Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Dispensed Transaction Coordinator<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38049\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38049<\/a><\/td>\n<td>Dwelling windows Dispensed Transaction Coordinator Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Be half of Engine<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38069\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38069<\/a><\/td>\n<td>Dwelling windows Be half of Engine Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Fax and Scan Carrier<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38104\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38104<\/a><\/td>\n<td>Dwelling windows Fax Carrier Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Filtering<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38034\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38034<\/a><\/td>\n<td>Dwelling windows Filtering Platform Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Image Acquisition<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38022\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38022<\/a><\/td>\n<td>Dwelling windows Image Acquisition Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Imaging Factor<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38060\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38060<\/a><\/td>\n<td>Dwelling windows Imaging Factor Far flung Code Execution Vulnerability<\/td>\n<td><span>Important<\/span><\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Cyber web Connection Sharing (ICS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38105\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38105<\/a><\/td>\n<td>Dwelling windows Layer-2 Bridge Network Driver Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Cyber web Connection Sharing (ICS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38053\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38053<\/a><\/td>\n<td>Dwelling windows Layer-2 Bridge Network Driver Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Cyber web Connection Sharing (ICS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38102\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38102<\/a><\/td>\n<td>Dwelling windows Layer-2 Bridge Network Driver Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Cyber web Connection Sharing (ICS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38101\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38101<\/a><\/td>\n<td>Dwelling windows Layer-2 Bridge Network Driver Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows iSCSI<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35270\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35270<\/a><\/td>\n<td>Dwelling windows iSCSI Carrier Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38041\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38041<\/a><\/td>\n<td>Dwelling windows Kernel Details Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38062\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38062<\/a><\/td>\n<td>Dwelling windows Kernel-Mode Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows LockDown Coverage (WLDP)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38070\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38070<\/a><\/td>\n<td>Dwelling windows LockDown Coverage (WLDP) Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Message Queuing<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38017\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38017<\/a><\/td>\n<td>Microsoft Message Queuing Details Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows MSHTML Platform<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38112\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38112<\/a><\/td>\n<td>Dwelling windows MSHTML Platform Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows MultiPoint Products and services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30013\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30013<\/a><\/td>\n<td>Dwelling windows MultiPoint Products and services Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows NTLM<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30081\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30081<\/a><\/td>\n<td>Dwelling windows NTLM Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows On-line Certificate Residing Protocol (OCSP)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38068\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38068<\/a><\/td>\n<td>Dwelling windows On-line Certificate Residing Protocol (OCSP) Server Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows On-line Certificate Residing Protocol (OCSP)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38067\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38067<\/a><\/td>\n<td>Dwelling windows On-line Certificate Residing Protocol (OCSP) Server Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows On-line Certificate Residing Protocol (OCSP)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38031\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38031<\/a><\/td>\n<td>Dwelling windows On-line Certificate Residing Protocol (OCSP) Server Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Efficiency Video show<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38028\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38028<\/a><\/td>\n<td>Microsoft Dwelling windows Efficiency Details Helper Library Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Efficiency Video show<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38019\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38019<\/a><\/td>\n<td>Microsoft Dwelling windows Efficiency Details Helper Library Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Efficiency Video show<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38025\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38025<\/a><\/td>\n<td>Microsoft Dwelling windows Efficiency Details Helper Library Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows PowerShell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38043\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38043<\/a><\/td>\n<td>PowerShell Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows PowerShell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38047\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38047<\/a><\/td>\n<td>PowerShell Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows PowerShell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38033\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38033<\/a><\/td>\n<td>PowerShell Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Far flung In finding admission to Connection Manager<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30071\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30071<\/a><\/td>\n<td>Dwelling windows Far flung In finding admission to Connection Manager Details Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Far flung In finding admission to Connection Manager<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30079\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30079<\/a><\/td>\n<td>Dwelling windows Far flung In finding admission to Connection Manager Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Far flung Desktop<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38076\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38076<\/a><\/td>\n<td>Dwelling windows Far flung Desktop Licensing Carrier Far flung Code Execution Vulnerability<\/td>\n<td><span>Important<\/span><\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Far flung Desktop<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38015\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38015<\/a><\/td>\n<td>Dwelling windows Far flung Desktop Gateway (RD Gateway) Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Far flung Desktop Licensing Carrier<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38071\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38071<\/a><\/td>\n<td>Dwelling windows Far flung Desktop Licensing Carrier Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Far flung Desktop Licensing Carrier<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38073\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38073<\/a><\/td>\n<td>Dwelling windows Far flung Desktop Licensing Carrier Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Far flung Desktop Licensing Carrier<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38074\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38074<\/a><\/td>\n<td>Dwelling windows Far flung Desktop Licensing Carrier Far flung Code Execution Vulnerability<\/td>\n<td><span>Important<\/span><\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Far flung Desktop Licensing Carrier<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38072\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38072<\/a><\/td>\n<td>Dwelling windows Far flung Desktop Licensing Carrier Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Far flung Desktop Licensing Carrier<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38077\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38077<\/a><\/td>\n<td>Dwelling windows Far flung Desktop Licensing Carrier Far flung Code Execution Vulnerability<\/td>\n<td><span>Important<\/span><\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Far flung Desktop Licensing Carrier<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38099\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38099<\/a><\/td>\n<td>Dwelling windows Far flung Desktop Licensing Carrier Denial of Carrier Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38065\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38065<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37986\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37986<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37981\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37981<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37987\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37987<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-28899\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-28899<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-26184\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-26184<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38011\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38011<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37984\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37984<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37988\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37988<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37977\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37977<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37978\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37978<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37974\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37974<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38010\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38010<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37989\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37989<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37970\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37970<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37975\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37975<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37972\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37972<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37973\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37973<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37971\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37971<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Obtain Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37969\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37969<\/a><\/td>\n<td>Obtain Boot Security Aim Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Server Backup<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38013\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38013<\/a><\/td>\n<td>Microsoft Dwelling windows Server Backup Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows TCP\/IP<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38064\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38064<\/a><\/td>\n<td>Dwelling windows TCP\/IP Details Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Topics<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38030\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38030<\/a><\/td>\n<td>Dwelling windows Topics Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Win32 Kernel Subsystem<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38085\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38085<\/a><\/td>\n<td>Dwelling windows Graphics Factor Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Win32K &#8211; GRFX<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38066\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38066<\/a><\/td>\n<td>Dwelling windows Win32k Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Win32K &#8211; ICOMP<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38059\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38059<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Dwelling windows Workstation Carrier<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38050\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38050<\/a><\/td>\n<td>Dwelling windows Workstation Carrier Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>XBox Crypto Graphic Products and services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38032\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38032<\/a><\/td>\n<td>Microsoft Xbox Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>XBox Crypto Graphic Products and services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38078\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38078<\/a><\/td>\n<td>Xbox Wireless Adapter Far flung Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As of late is Microsoft&#8217;s July 2024 Patch Tuesday, which includes security updates for 142&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days - CBS26 Arizona<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days - CBS26 Arizona\" \/>\n<meta property=\"og:description\" content=\"As of late is Microsoft&#8217;s July 2024 Patch Tuesday, which includes security updates for 142...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/\" \/>\n<meta property=\"og:site_name\" content=\"CBS26 Arizona\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CBSNews\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-10T01:39:59+00:00\" \/>\n<meta name=\"author\" content=\"cbs26.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CBSNews\" \/>\n<meta name=\"twitter:site\" content=\"@CBSNews\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cbs26.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/\"},\"author\":{\"name\":\"cbs26.com\",\"@id\":\"https:\/\/cbs26.com\/#\/schema\/person\/6f199387dd167b788a14f8b99f8ff352\"},\"headline\":\"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days\",\"datePublished\":\"2024-07-10T01:39:59+00:00\",\"dateModified\":\"2024-07-10T01:39:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/\"},\"wordCount\":2697,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cbs26.com\/#organization\"},\"articleSection\":[\"News Alert\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/\",\"url\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/\",\"name\":\"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days - CBS26 Arizona\",\"isPartOf\":{\"@id\":\"https:\/\/cbs26.com\/#website\"},\"datePublished\":\"2024-07-10T01:39:59+00:00\",\"dateModified\":\"2024-07-10T01:39:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cbs26.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cbs26.com\/#website\",\"url\":\"https:\/\/cbs26.com\/\",\"name\":\"CBS26 Arizona\",\"description\":\"The Spirit of Arizona\",\"publisher\":{\"@id\":\"https:\/\/cbs26.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cbs26.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cbs26.com\/#organization\",\"name\":\"CBS26 Arizona\",\"url\":\"https:\/\/cbs26.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/cbs26.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cbs26.com\/wp-content\/uploads\/2023\/12\/cbs26.fw_-1-e1703104627272.png\",\"contentUrl\":\"https:\/\/cbs26.com\/wp-content\/uploads\/2023\/12\/cbs26.fw_-1-e1703104627272.png\",\"width\":296,\"height\":96,\"caption\":\"CBS26 Arizona\"},\"image\":{\"@id\":\"https:\/\/cbs26.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CBSNews\/\",\"https:\/\/x.com\/CBSNews\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cbs26.com\/#\/schema\/person\/6f199387dd167b788a14f8b99f8ff352\",\"name\":\"cbs26.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/cbs26.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e5c693e6a74bdbc1461a75db724fe465?s=96&d=mm&r=r\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e5c693e6a74bdbc1461a75db724fe465?s=96&d=mm&r=r\",\"caption\":\"cbs26.com\"},\"sameAs\":[\"http:\/\/cbs26.com\"],\"url\":\"https:\/\/cbs26.com\/index.php\/author\/cbs26-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days - CBS26 Arizona","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/","og_locale":"en_GB","og_type":"article","og_title":"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days - CBS26 Arizona","og_description":"As of late is Microsoft&#8217;s July 2024 Patch Tuesday, which includes security updates for 142...","og_url":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/","og_site_name":"CBS26 Arizona","article_publisher":"https:\/\/www.facebook.com\/CBSNews\/","article_published_time":"2024-07-10T01:39:59+00:00","author":"cbs26.com","twitter_card":"summary_large_image","twitter_creator":"@CBSNews","twitter_site":"@CBSNews","twitter_misc":{"Written by":"cbs26.com","Estimated reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/#article","isPartOf":{"@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/"},"author":{"name":"cbs26.com","@id":"https:\/\/cbs26.com\/#\/schema\/person\/6f199387dd167b788a14f8b99f8ff352"},"headline":"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days","datePublished":"2024-07-10T01:39:59+00:00","dateModified":"2024-07-10T01:39:59+00:00","mainEntityOfPage":{"@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/"},"wordCount":2697,"commentCount":0,"publisher":{"@id":"https:\/\/cbs26.com\/#organization"},"articleSection":["News Alert"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/","url":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/","name":"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days - CBS26 Arizona","isPartOf":{"@id":"https:\/\/cbs26.com\/#website"},"datePublished":"2024-07-10T01:39:59+00:00","dateModified":"2024-07-10T01:39:59+00:00","breadcrumb":{"@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cbs26.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days"}]},{"@type":"WebSite","@id":"https:\/\/cbs26.com\/#website","url":"https:\/\/cbs26.com\/","name":"CBS26 Arizona","description":"The Spirit of Arizona","publisher":{"@id":"https:\/\/cbs26.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cbs26.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/cbs26.com\/#organization","name":"CBS26 Arizona","url":"https:\/\/cbs26.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cbs26.com\/#\/schema\/logo\/image\/","url":"https:\/\/cbs26.com\/wp-content\/uploads\/2023\/12\/cbs26.fw_-1-e1703104627272.png","contentUrl":"https:\/\/cbs26.com\/wp-content\/uploads\/2023\/12\/cbs26.fw_-1-e1703104627272.png","width":296,"height":96,"caption":"CBS26 Arizona"},"image":{"@id":"https:\/\/cbs26.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CBSNews\/","https:\/\/x.com\/CBSNews"]},{"@type":"Person","@id":"https:\/\/cbs26.com\/#\/schema\/person\/6f199387dd167b788a14f8b99f8ff352","name":"cbs26.com","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cbs26.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e5c693e6a74bdbc1461a75db724fe465?s=96&d=mm&r=r","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5c693e6a74bdbc1461a75db724fe465?s=96&d=mm&r=r","caption":"cbs26.com"},"sameAs":["http:\/\/cbs26.com"],"url":"https:\/\/cbs26.com\/index.php\/author\/cbs26-com\/"}]}},"_links":{"self":[{"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/posts\/27898"}],"collection":[{"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/comments?post=27898"}],"version-history":[{"count":0,"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/posts\/27898\/revisions"}],"wp:attachment":[{"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/media?parent=27898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/categories?post=27898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/tags?post=27898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}