{"id":135682,"date":"2024-12-11T04:26:11","date_gmt":"2024-12-10T21:26:11","guid":{"rendered":"https:\/\/hotvideos24.online\/?p=135682"},"modified":"2024-12-11T04:26:11","modified_gmt":"2024-12-10T21:26:11","slug":"microsoft-december-2024-patch-tuesday-fixes-1-exploited-zero-day-71-flaws","status":"publish","type":"post","link":"https:\/\/hotvideos24.online\/?p=135682","title":{"rendered":"Microsoft December 2024 Patch Tuesday fixes 1 exploited zero-day, 71 flaws"},"content":{"rendered":"<p> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3711241968723425\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-format=\"fluid\"\r\n     data-ad-layout-key=\"-fb+5w+4e-db+86\"\r\n     data-ad-client=\"ca-pub-3711241968723425\"\r\n     data-ad-slot=\"7910942971\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script><br \/>\n<\/p>\n<div id=\"\">\n<tr>\n<th>Tag<\/th>\n<p>&#13;<\/p>\n<th>CVE ID<\/th>\n<p>&#13;<\/p>\n<th>CVE Title<\/th>\n<p>&#13;<\/p>\n<th>Severity<\/th>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>GitHub<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49063\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49063<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft\/Muzic Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Defender for Endpoint<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49057\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49057<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft Defender for Endpoint on Android Spoofing Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-12053\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-12053<\/a><\/td>\n<p>&#13;<\/p>\n<td>Chromium: CVE-2024-12053 Type Confusion in V8<\/td>\n<p>&#13;<\/p>\n<td>Unknown<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Edge (Chromium-based)<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49041\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49041<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft Edge (Chromium-based) Spoofing Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Moderate<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/ADV240002\" rel=\"nofollow noopener\" target=\"_blank\">ADV240002<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft Office Defense in Depth Update<\/td>\n<p>&#13;<\/p>\n<td>Moderate<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49059\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49059<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft Office Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43600\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-43600<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft Office Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Office Access<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49142\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49142<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft Access Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Office Excel<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49069\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49069<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Office Publisher<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49079\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49079<\/a><\/td>\n<p>&#13;<\/p>\n<td>Input Method Editor (IME) Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Office SharePoint<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49064\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49064<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft SharePoint Information Disclosure Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Office SharePoint<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49062\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49062<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft SharePoint Information Disclosure Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Office SharePoint<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49068\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49068<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Office SharePoint<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49070\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49070<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Microsoft Office Word<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49065\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49065<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Role: DNS Server<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49091\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49091<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Domain Name Service Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Role: Windows Hyper-V<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49117\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49117<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Hyper-V Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>System Center Operations Manager<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43594\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-43594<\/a><\/td>\n<p>&#13;<\/p>\n<td>System Center Operations Manager Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Cloud Files Mini Filter Driver<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49114\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49114<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Common Log File System Driver<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49088\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49088<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Common Log File System Driver<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49138\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49138<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Common Log File System Driver<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49090\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49090<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows File Explorer<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49082\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49082<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows File Explorer Information Disclosure Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows IP Routing Management Snapin<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49080\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49080<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows IP Routing Management Snapin Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49084\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49084<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49074\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49074<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49121\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49121<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49124\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49124<\/a><\/td>\n<p>&#13;<\/p>\n<td>Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49112\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49112<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49113\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49113<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49127\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49127<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Local Security Authority Subsystem Service (LSASS)<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49126\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49126<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Message Queuing<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49118\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49118<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Message Queuing<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49122\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49122<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Message Queuing<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49096\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49096<\/a><\/td>\n<p>&#13;<\/p>\n<td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Mobile Broadband<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49073\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49073<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Mobile Broadband<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49077\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49077<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Mobile Broadband<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49083\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49083<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Mobile Broadband<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49092\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49092<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Mobile Broadband<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49087\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49087<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Mobile Broadband Driver Information Disclosure Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Mobile Broadband<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49110\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49110<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Mobile Broadband<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49078\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49078<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows PrintWorkflowUserSvc<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49095\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49095<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows PrintWorkflowUserSvc<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49097\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49097<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Remote Desktop<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49132\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49132<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Remote Desktop Services<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49115\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49115<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Remote Desktop Services<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49116\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49116<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Remote Desktop Services<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49123\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49123<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Remote Desktop Services<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49129\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49129<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Remote Desktop Services<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49075\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49075<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Remote Desktop Services Denial of Service Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Remote Desktop Services<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49128\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49128<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Remote Desktop Services<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49106\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49106<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Remote Desktop Services<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49108\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49108<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Remote Desktop Services<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49119\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49119<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Remote Desktop Services<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49120\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49120<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td><span class=\"crit\">Critical<\/span><\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Resilient File System (ReFS)<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49093\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49093<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49085\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49085<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49086\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49086<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49089\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49089<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49125\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49125<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49104\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49104<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Routing and Remote Access Service (RRAS)<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49102\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49102<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Task Scheduler<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49072\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49072<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Task Scheduler Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Virtualization-Based Security (VBS) Enclave<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49076\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49076<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Wireless Wide Area Network Service<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49081\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49081<\/a><\/td>\n<p>&#13;<\/p>\n<td>Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Wireless Wide Area Network Service<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49103\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49103<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Wireless Wide Area Network Service<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49111\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49111<\/a><\/td>\n<p>&#13;<\/p>\n<td>Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Wireless Wide Area Network Service<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49109\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49109<\/a><\/td>\n<p>&#13;<\/p>\n<td>Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Wireless Wide Area Network Service<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49101\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49101<\/a><\/td>\n<p>&#13;<\/p>\n<td>Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Wireless Wide Area Network Service<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49094\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49094<\/a><\/td>\n<p>&#13;<\/p>\n<td>Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Wireless Wide Area Network Service<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49098\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49098<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>Windows Wireless Wide Area Network Service<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49099\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49099<\/a><\/td>\n<p>&#13;<\/p>\n<td>Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<tr>\n<td>WmsRepair Service<\/td>\n<p>&#13;<\/p>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49107\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2024-49107<\/a><\/td>\n<p>&#13;<\/p>\n<td>WmsRepair Service Elevation of Privilege Vulnerability<\/td>\n<p>&#13;<\/p>\n<td>Important<\/td>\n<p>&#13;<br \/>\n\t\t<\/tr>\n<\/div>\n<p><script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3711241968723425\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-format=\"fluid\"\r\n     data-ad-layout-key=\"-fb+5w+4e-db+86\"\r\n     data-ad-client=\"ca-pub-3711241968723425\"\r\n     data-ad-slot=\"7910942971\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script><br \/>\n<br \/><div data-type=\"_mgwidget\" data-widget-id=\"1660802\">\r\n<\/div>\r\n<script>(function(w,q){w[q]=w[q]||[];w[q].push([\"_mgc.load\"])})(window,\"_mgq\");\r\n<\/script>\r\n<br \/>\n<br \/><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-december-2024-patch-tuesday-fixes-1-exploited-zero-day-71-flaws\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tag &#13; CVE ID &#13; CVE Title &#13; Severity &#13; GitHub &#13; CVE-2024-49063 &#13; Microsoft\/Muzic Remote Code Execution Vulnerability &#13; Important &#13; Microsoft Defender for Endpoint &#13; CVE-2024-49057 &#13; Microsoft &hellip; <a href=\"https:\/\/hotvideos24.online\/?p=135682\" class=\"more-link\">Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8630],"tags":[],"class_list":["post-135682","post","type-post","status-publish","format-standard","hentry","category-technology","entry"],"_links":{"self":[{"href":"https:\/\/hotvideos24.online\/index.php?rest_route=\/wp\/v2\/posts\/135682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hotvideos24.online\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hotvideos24.online\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hotvideos24.online\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hotvideos24.online\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=135682"}],"version-history":[{"count":0,"href":"https:\/\/hotvideos24.online\/index.php?rest_route=\/wp\/v2\/posts\/135682\/revisions"}],"wp:attachment":[{"href":"https:\/\/hotvideos24.online\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=135682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hotvideos24.online\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=135682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hotvideos24.online\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=135682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}