{"id":27914,"date":"2024-07-09T19:39:32","date_gmt":"2024-07-10T02:39:32","guid":{"rendered":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/"},"modified":"2024-07-09T19:39:32","modified_gmt":"2024-07-10T02:39:32","slug":"microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2","status":"publish","type":"post","link":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/","title":{"rendered":"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days"},"content":{"rendered":"<p>Right this moment time is Microsoft&#8217;s July 2024 Patch Tuesday, which incorporates safety updates for 142 flaws, including two actively exploited and two publicly disclosed zero-days.<\/p>\n<p>This Patch Tuesday mounted 5 crucial vulnerabilities, with all being far away code execution flaws.<\/p>\n<p>This month&#8217;s Patch Tuesday fixes two actively exploited and two other publicly disclosed zero-day vulnerabilities.<\/p>\n<p>Microsoft classifies a zero-day flaw as one which is publicly disclosed or actively exploited whereas no legit fix is offered.<\/p>\n<p>Microsoft has mounted an actively exploited Hyper-V elevation of privileges vulnerability that offers attackers SYSTEM privileges.<\/p>\n<p>&#8220;An attacker who efficiently exploited this vulnerability could well kind SYSTEM privileges,&#8221; explains Microsoft.<\/p>\n<p>While Microsoft states that the flaw is actively exploited, it has no longer shared any extra facts about the vulnerability, including who chanced on it.<\/p>\n<p>&#8220;Successful exploitation of this vulnerability requires an attacker to plan conclude extra actions earlier than exploitation to prepare the target ambiance,&#8221; explains Microsoft.<\/p>\n<p>&#8220;An attacker would should ship the sufferer a malicious file that the sufferer would should attain,&#8221; endured Microsoft.<\/p>\n<p>Microsoft did no longer allotment any extra facts on how the vulnerability became exploited.<\/p>\n<p>Microsoft mounted a publicly disclosed .NET and Visible Studio RCE.<\/p>\n<p>&#8220;An attacker could well exploit this by closing an http\/3 bolt whereas the inquire physique is being processed leading to a speed condition. This could well lead to far away code execution,&#8221; explains Microsoft.<\/p>\n<p>Microsoft has no longer shared where it became publicly disclosed and said it became internally chanced on by&nbsp;Radek Zikmund of Microsoft Corporation.<\/p>\n<p><strong><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37985\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-37985<\/a> &#8211; Arm: CVE-2024-37985 Systematic Identification and Characterization of Proprietary Prefetchers<\/strong><\/p>\n<p>Microsoft has mounted a beforehand disclosed &#8220;<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623124\" target=\"_blank\" rel=\"nofollow noopener\">FetchBench<\/a>&#8221; aspect-channel assault that could be ragged to steal &#8220;secret files.&#8221;<\/p>\n<p>&#8220;An attacker who efficiently exploited this vulnerability could well glimpse heap memory from a privileged task running on the server,&#8221; explains Microsoft.<\/p>\n<p>&#8220;Successful exploitation of this vulnerability requires an attacker to plan conclude extra actions earlier than exploitation to prepare the target ambiance,&#8221; endured Microsoft.<\/p>\n<p>Below is your whole record of resolved vulnerabilities within the July 2024 Patch Tuesday updates.<\/p>\n<p>To&nbsp;obtain admission to the plump description of each vulnerability and the systems&nbsp;it impacts, it&#8217;s essential to well glimpse the<a href=\"https:\/\/www.bleepingcomputer.com\/microsoft-patch-tuesday-reports\/Microsoft-Patch-Tuesday-July-2024.html\" target=\"_blank\" rel=\"noopener\">plump document right here<\/a>.<\/p>\n<div>\n<table readabilitydatatable=\"1\">\n<tbody>\n<tr>\n<th>Heed<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<th>Severity<\/th>\n<\/tr>\n<tr>\n<td>.NET and Visible Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30105\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30105<\/a><\/td>\n<td>.NET Core and Visible Studio Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>.NET and Visible Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38081\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38081<\/a><\/td>\n<td>.NET, .NET Framework, and Visible Studio Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>.NET and Visible Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35264\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35264<\/a><\/td>\n<td>.NET and Visible Studio Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>.NET and Visible Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38095\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38095<\/a><\/td>\n<td>.NET and Visible Studio Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Packed with life Itemizing Rights Management Companies<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-39684\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-39684<\/a><\/td>\n<td>Github: CVE-2024-39684 TenCent RapidJSON Elevation of Privilege Vulnerability<\/td>\n<td>Moderate<\/td>\n<\/tr>\n<tr>\n<td>Packed with life Itemizing Rights Management Companies<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38517\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38517<\/a><\/td>\n<td>Github: CVE-2024-38517 TenCent RapidJSON Elevation of Privilege Vulnerability<\/td>\n<td>Moderate<\/td>\n<\/tr>\n<tr>\n<td>Azure CycleCloud<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38092\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38092<\/a><\/td>\n<td>Azure CycleCloud Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Azure DevOps<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35266\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35266<\/a><\/td>\n<td>Azure DevOps Server Spoofing Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Azure DevOps<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35267\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35267<\/a><\/td>\n<td>Azure DevOps Server Spoofing Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Azure Kinect SDK<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38086\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38086<\/a><\/td>\n<td>Azure Kinect SDK Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Azure Community Watcher<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35261\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35261<\/a><\/td>\n<td>Azure Community Watcher VM Extension Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Intel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37985\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37985<\/a><\/td>\n<td>Arm: CVE-2024-37985 Systematic Identification and Characterization of Proprietary Prefetchers<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Line Printer Daemon Service (LPD)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38027\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38027<\/a><\/td>\n<td>Windows Line Printer Daemon Service Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Defender for IoT<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38089\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38089<\/a><\/td>\n<td>Microsoft Defender for IoT Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Dynamics<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30061\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30061<\/a><\/td>\n<td>Microsoft Dynamics 365 (On-Premises) Recordsdata Disclosure Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Ingredient<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38079\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38079<\/a><\/td>\n<td>Windows Graphics Ingredient Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Ingredient<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38051\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38051<\/a><\/td>\n<td>Windows Graphics Ingredient Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Put of job<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38021\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38021<\/a><\/td>\n<td>Microsoft Put of job Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Put of job Outlook<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38020\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38020<\/a><\/td>\n<td>Microsoft Outlook Spoofing Vulnerability<\/td>\n<td>Moderate<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Put of job SharePoint<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38024\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38024<\/a><\/td>\n<td>Microsoft SharePoint Server Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Put of job SharePoint<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38023\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38023<\/a><\/td>\n<td>Microsoft SharePoint Server Far off Code Execution Vulnerability<\/td>\n<td><span>Serious<\/span><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Put of job SharePoint<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-32987\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-32987<\/a><\/td>\n<td>Microsoft SharePoint Server Recordsdata Disclosure Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Put of job SharePoint<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38094\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38094<\/a><\/td>\n<td>Microsoft SharePoint Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Streaming Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38057\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38057<\/a><\/td>\n<td>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Streaming Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38054\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38054<\/a><\/td>\n<td>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Streaming Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38052\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38052<\/a><\/td>\n<td>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows Codecs Library<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38055\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38055<\/a><\/td>\n<td>Microsoft Windows Codecs Library Recordsdata Disclosure Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows Codecs Library<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38056\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38056<\/a><\/td>\n<td>Microsoft Windows Codecs Library Recordsdata Disclosure Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Microsoft WS-Discovery<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38091\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38091<\/a><\/td>\n<td>Microsoft WS-Discovery Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>NDIS<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38048\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38048<\/a><\/td>\n<td>Windows Community Driver Interface Specification (NDIS) Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>NPS RADIUS Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-3596\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-3596<\/a><\/td>\n<td>CERT\/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Characteristic: Packed with life Itemizing Certificates Companies; Packed with life Itemizing Domain Companies<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38061\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38061<\/a><\/td>\n<td>DCOM Far off Sinful-Session Activation Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Characteristic: Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38080\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38080<\/a><\/td>\n<td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-28928\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-28928<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38088\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38088<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-20701\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-20701<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21317\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21317<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21331\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21331<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21308\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21308<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21333\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21333<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35256\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35256<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21303\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21303<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21335\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21335<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35271\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35271<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35272\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35272<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21332\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21332<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38087\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38087<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21425\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21425<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21449\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21449<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37324\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37324<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37330\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37330<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37326\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37326<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37329\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37329<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37328\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37328<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37327\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37327<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37334\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37334<\/a><\/td>\n<td>Microsoft OLE DB Driver for SQL Server Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37321\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37321<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37320\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37320<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37319\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37319<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37322\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37322<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37333\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37333<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37336\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37336<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37323\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37323<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37331\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37331<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21398\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21398<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21373\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21373<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37318\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37318<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21428\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21428<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21415\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21415<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37332\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37332<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21414\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21414<\/a><\/td>\n<td>SQL Server Native Client OLE DB Provider Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows BitLocker<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38058\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38058<\/a><\/td>\n<td>BitLocker Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows COM Session<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38100\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38100<\/a><\/td>\n<td>Windows File Explorer Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows CoreMessaging<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21417\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-21417<\/a><\/td>\n<td>Windows Textual vow Companies Framework Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Cryptographic Companies<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30098\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30098<\/a><\/td>\n<td>Windows Cryptographic Companies Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows DHCP Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38044\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38044<\/a><\/td>\n<td>DHCP Server Service Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Dispensed Transaction Coordinator<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38049\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38049<\/a><\/td>\n<td>Windows Dispensed Transaction Coordinator Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Sign up Engine<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38069\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38069<\/a><\/td>\n<td>Windows Sign up Engine Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Fax and Scan Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38104\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38104<\/a><\/td>\n<td>Windows Fax Service Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Filtering<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38034\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38034<\/a><\/td>\n<td>Windows Filtering Platform Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Image Acquisition<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38022\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38022<\/a><\/td>\n<td>Windows Image Acquisition Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Imaging Ingredient<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38060\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38060<\/a><\/td>\n<td>Windows Imaging Ingredient Far off Code Execution Vulnerability<\/td>\n<td><span>Serious<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows Web Connection Sharing (ICS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38105\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38105<\/a><\/td>\n<td>Windows Layer-2 Bridge Community Driver Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Web Connection Sharing (ICS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38053\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38053<\/a><\/td>\n<td>Windows Layer-2 Bridge Community Driver Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Web Connection Sharing (ICS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38102\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38102<\/a><\/td>\n<td>Windows Layer-2 Bridge Community Driver Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Web Connection Sharing (ICS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38101\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38101<\/a><\/td>\n<td>Windows Layer-2 Bridge Community Driver Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows iSCSI<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-35270\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-35270<\/a><\/td>\n<td>Windows iSCSI Service Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38041\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38041<\/a><\/td>\n<td>Windows Kernel Recordsdata Disclosure Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38062\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38062<\/a><\/td>\n<td>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows LockDown Policy (WLDP)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38070\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38070<\/a><\/td>\n<td>Windows LockDown Policy (WLDP) Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Message Queuing<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38017\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38017<\/a><\/td>\n<td>Microsoft Message Queuing Recordsdata Disclosure Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows MSHTML Platform<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38112\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38112<\/a><\/td>\n<td>Windows MSHTML Platform Spoofing Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows MultiPoint Companies<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30013\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30013<\/a><\/td>\n<td>Windows MultiPoint Companies Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows NTLM<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30081\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30081<\/a><\/td>\n<td>Windows NTLM Spoofing Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows On-line Certificates Space Protocol (OCSP)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38068\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38068<\/a><\/td>\n<td>Windows On-line Certificates Space Protocol (OCSP) Server Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows On-line Certificates Space Protocol (OCSP)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38067\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38067<\/a><\/td>\n<td>Windows On-line Certificates Space Protocol (OCSP) Server Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows On-line Certificates Space Protocol (OCSP)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38031\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38031<\/a><\/td>\n<td>Windows On-line Certificates Space Protocol (OCSP) Server Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Performance Note<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38028\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38028<\/a><\/td>\n<td>Microsoft Windows Performance Records Helper Library Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Performance Note<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38019\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38019<\/a><\/td>\n<td>Microsoft Windows Performance Records Helper Library Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Performance Note<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38025\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38025<\/a><\/td>\n<td>Microsoft Windows Performance Records Helper Library Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows PowerShell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38043\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38043<\/a><\/td>\n<td>PowerShell Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows PowerShell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38047\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38047<\/a><\/td>\n<td>PowerShell Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows PowerShell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38033\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38033<\/a><\/td>\n<td>PowerShell Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Far off Secure entry to Connection Supervisor<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30071\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30071<\/a><\/td>\n<td>Windows Far off Secure entry to Connection Supervisor Recordsdata Disclosure Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Far off Secure entry to Connection Supervisor<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30079\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-30079<\/a><\/td>\n<td>Windows Far off Secure entry to Connection Supervisor Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Far off Desktop<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38076\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38076<\/a><\/td>\n<td>Windows Far off Desktop Licensing Service Far off Code Execution Vulnerability<\/td>\n<td><span>Serious<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows Far off Desktop<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38015\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38015<\/a><\/td>\n<td>Windows Far off Desktop Gateway (RD Gateway) Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Far off Desktop Licensing Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38071\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38071<\/a><\/td>\n<td>Windows Far off Desktop Licensing Service Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Far off Desktop Licensing Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38073\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38073<\/a><\/td>\n<td>Windows Far off Desktop Licensing Service Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Far off Desktop Licensing Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38074\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38074<\/a><\/td>\n<td>Windows Far off Desktop Licensing Service Far off Code Execution Vulnerability<\/td>\n<td><span>Serious<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows Far off Desktop Licensing Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38072\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38072<\/a><\/td>\n<td>Windows Far off Desktop Licensing Service Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Far off Desktop Licensing Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38077\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38077<\/a><\/td>\n<td>Windows Far off Desktop Licensing Service Far off Code Execution Vulnerability<\/td>\n<td><span>Serious<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows Far off Desktop Licensing Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38099\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38099<\/a><\/td>\n<td>Windows Far off Desktop Licensing Service Denial of Service Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38065\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38065<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37986\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37986<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37981\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37981<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37987\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37987<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-28899\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-28899<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-26184\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-26184<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38011\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38011<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37984\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37984<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37988\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37988<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37977\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37977<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37978\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37978<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37974\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37974<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38010\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38010<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37989\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37989<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37970\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37970<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37975\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37975<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37972\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37972<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37973\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37973<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37971\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37971<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Stable Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37969\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-37969<\/a><\/td>\n<td>Stable Boot Safety Characteristic Bypass Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Server Backup<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38013\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38013<\/a><\/td>\n<td>Microsoft Windows Server Backup Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows TCP\/IP<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38064\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38064<\/a><\/td>\n<td>Windows TCP\/IP Recordsdata Disclosure Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Topics<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38030\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38030<\/a><\/td>\n<td>Windows Topics Spoofing Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Win32 Kernel Subsystem<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38085\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38085<\/a><\/td>\n<td>Windows Graphics Ingredient Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Win32K &#8211; GRFX<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38066\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38066<\/a><\/td>\n<td>Windows Win32k Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Win32K &#8211; ICOM P<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38059\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38059<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>Windows Workstation Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38050\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38050<\/a><\/td>\n<td>Windows Workstation Service Elevation of Privilege Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>XBox Crypto Graphic Companies<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38032\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38032<\/a><\/td>\n<td>Microsoft Xbox Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<tr>\n<td>XBox Crypto Graphic Companies<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38078\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-38078<\/a><\/td>\n<td>Xbox Wireless Adapter Far off Code Execution Vulnerability<\/td>\n<td>Crucial<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Right this moment time is Microsoft&#8217;s July 2024 Patch Tuesday, which incorporates safety updates for&#8230;<\/p>\n","protected":false},"author":1,"featured_media":27915,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[386,2357],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days - CBS26 Arizona<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days - CBS26 Arizona\" \/>\n<meta property=\"og:description\" content=\"Right this moment time is Microsoft&#8217;s July 2024 Patch Tuesday, which incorporates safety updates for...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/\" \/>\n<meta property=\"og:site_name\" content=\"CBS26 Arizona\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CBSNews\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-10T02:39:32+00:00\" \/>\n<meta name=\"author\" content=\"cbs26.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CBSNews\" \/>\n<meta name=\"twitter:site\" content=\"@CBSNews\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cbs26.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/\"},\"author\":{\"name\":\"cbs26.com\",\"@id\":\"https:\/\/cbs26.com\/#\/schema\/person\/6f199387dd167b788a14f8b99f8ff352\"},\"headline\":\"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days\",\"datePublished\":\"2024-07-10T02:39:32+00:00\",\"dateModified\":\"2024-07-10T02:39:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/\"},\"wordCount\":2531,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cbs26.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cbs26.com\/wp-content\/uploads\/2024\/07\/27914-microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days.jpg\",\"articleSection\":[\"Microsoft\",\"Patch\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/\",\"url\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/\",\"name\":\"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days - CBS26 Arizona\",\"isPartOf\":{\"@id\":\"https:\/\/cbs26.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cbs26.com\/wp-content\/uploads\/2024\/07\/27914-microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days.jpg\",\"datePublished\":\"2024-07-10T02:39:32+00:00\",\"dateModified\":\"2024-07-10T02:39:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#primaryimage\",\"url\":\"https:\/\/cbs26.com\/wp-content\/uploads\/2024\/07\/27914-microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days.jpg\",\"contentUrl\":\"https:\/\/cbs26.com\/wp-content\/uploads\/2024\/07\/27914-microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days.jpg\",\"width\":1280,\"height\":720,\"caption\":\"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cbs26.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cbs26.com\/#website\",\"url\":\"https:\/\/cbs26.com\/\",\"name\":\"CBS26 Arizona\",\"description\":\"The Spirit of Arizona\",\"publisher\":{\"@id\":\"https:\/\/cbs26.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cbs26.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cbs26.com\/#organization\",\"name\":\"CBS26 Arizona\",\"url\":\"https:\/\/cbs26.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/cbs26.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cbs26.com\/wp-content\/uploads\/2023\/12\/cbs26.fw_-1-e1703104627272.png\",\"contentUrl\":\"https:\/\/cbs26.com\/wp-content\/uploads\/2023\/12\/cbs26.fw_-1-e1703104627272.png\",\"width\":296,\"height\":96,\"caption\":\"CBS26 Arizona\"},\"image\":{\"@id\":\"https:\/\/cbs26.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CBSNews\/\",\"https:\/\/x.com\/CBSNews\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cbs26.com\/#\/schema\/person\/6f199387dd167b788a14f8b99f8ff352\",\"name\":\"cbs26.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/cbs26.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e5c693e6a74bdbc1461a75db724fe465?s=96&d=mm&r=r\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e5c693e6a74bdbc1461a75db724fe465?s=96&d=mm&r=r\",\"caption\":\"cbs26.com\"},\"sameAs\":[\"http:\/\/cbs26.com\"],\"url\":\"https:\/\/cbs26.com\/index.php\/author\/cbs26-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days - CBS26 Arizona","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/","og_locale":"en_GB","og_type":"article","og_title":"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days - CBS26 Arizona","og_description":"Right this moment time is Microsoft&#8217;s July 2024 Patch Tuesday, which incorporates safety updates for...","og_url":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/","og_site_name":"CBS26 Arizona","article_publisher":"https:\/\/www.facebook.com\/CBSNews\/","article_published_time":"2024-07-10T02:39:32+00:00","author":"cbs26.com","twitter_card":"summary_large_image","twitter_creator":"@CBSNews","twitter_site":"@CBSNews","twitter_misc":{"Written by":"cbs26.com","Estimated reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#article","isPartOf":{"@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/"},"author":{"name":"cbs26.com","@id":"https:\/\/cbs26.com\/#\/schema\/person\/6f199387dd167b788a14f8b99f8ff352"},"headline":"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days","datePublished":"2024-07-10T02:39:32+00:00","dateModified":"2024-07-10T02:39:32+00:00","mainEntityOfPage":{"@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/"},"wordCount":2531,"commentCount":0,"publisher":{"@id":"https:\/\/cbs26.com\/#organization"},"image":{"@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#primaryimage"},"thumbnailUrl":"https:\/\/cbs26.com\/wp-content\/uploads\/2024\/07\/27914-microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days.jpg","articleSection":["Microsoft","Patch"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/","url":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/","name":"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days - CBS26 Arizona","isPartOf":{"@id":"https:\/\/cbs26.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#primaryimage"},"image":{"@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#primaryimage"},"thumbnailUrl":"https:\/\/cbs26.com\/wp-content\/uploads\/2024\/07\/27914-microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days.jpg","datePublished":"2024-07-10T02:39:32+00:00","dateModified":"2024-07-10T02:39:32+00:00","breadcrumb":{"@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#primaryimage","url":"https:\/\/cbs26.com\/wp-content\/uploads\/2024\/07\/27914-microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days.jpg","contentUrl":"https:\/\/cbs26.com\/wp-content\/uploads\/2024\/07\/27914-microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days.jpg","width":1280,"height":720,"caption":"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days"},{"@type":"BreadcrumbList","@id":"https:\/\/cbs26.com\/index.php\/2024\/07\/09\/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cbs26.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days"}]},{"@type":"WebSite","@id":"https:\/\/cbs26.com\/#website","url":"https:\/\/cbs26.com\/","name":"CBS26 Arizona","description":"The Spirit of Arizona","publisher":{"@id":"https:\/\/cbs26.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cbs26.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/cbs26.com\/#organization","name":"CBS26 Arizona","url":"https:\/\/cbs26.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cbs26.com\/#\/schema\/logo\/image\/","url":"https:\/\/cbs26.com\/wp-content\/uploads\/2023\/12\/cbs26.fw_-1-e1703104627272.png","contentUrl":"https:\/\/cbs26.com\/wp-content\/uploads\/2023\/12\/cbs26.fw_-1-e1703104627272.png","width":296,"height":96,"caption":"CBS26 Arizona"},"image":{"@id":"https:\/\/cbs26.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CBSNews\/","https:\/\/x.com\/CBSNews"]},{"@type":"Person","@id":"https:\/\/cbs26.com\/#\/schema\/person\/6f199387dd167b788a14f8b99f8ff352","name":"cbs26.com","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cbs26.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e5c693e6a74bdbc1461a75db724fe465?s=96&d=mm&r=r","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5c693e6a74bdbc1461a75db724fe465?s=96&d=mm&r=r","caption":"cbs26.com"},"sameAs":["http:\/\/cbs26.com"],"url":"https:\/\/cbs26.com\/index.php\/author\/cbs26-com\/"}]}},"_links":{"self":[{"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/posts\/27914"}],"collection":[{"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/comments?post=27914"}],"version-history":[{"count":0,"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/posts\/27914\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/media\/27915"}],"wp:attachment":[{"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/media?parent=27914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/categories?post=27914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cbs26.com\/index.php\/wp-json\/wp\/v2\/tags?post=27914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}